Analysis
-
max time kernel
27s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230221-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1468 conhost.exe 1468 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1316 1468 conhost.exe 27 PID 1468 wrote to memory of 1316 1468 conhost.exe 27 PID 1468 wrote to memory of 1316 1468 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422.1MB
MD5f5a6eadb632acb7980c0bdb91cdce3e8
SHA1fed3dc51c4f2bd106600c76b5a091ddbe0fce046
SHA256a3b0e055b1ad254b19fd40688ca2ffc3f787e1120aa0166d138ca312c9e78353
SHA512880f8bbe966ac91d9b601328de1fa45dcb1ff6867b47372626aa7836bc08b8f46dffa9774e127182995a8bd9e3e27d550ab93c194f77fff32517bf6e7a500b36
-
Filesize
418.5MB
MD59a5ddd90edf84b2a845474c7f19ed32a
SHA1e75b63de4f58eba1fd692fba8fd3bbf04f9a2394
SHA256dbbaa482c304c4c64246bbd0383333ede76b6d6c7d23026d0b4d6050bb72039d
SHA51234a0442661cd002ae82214e12de33ca321b6f8e41c39bc8162b8256af39628dec0d376144ba747ae43158da81ef0b878a5fd4e6c047403dcfdd148e3365f8bf5
-
Filesize
437.0MB
MD5934f86bc8662ca5477fb15f4291208f5
SHA1ad213d966503d7fe827f5970b95f09aff1db3d9c
SHA25665d947b56dfc862e22eaeb1a26c140f5ab6b14a4dfddc3ba45de5803278e801b
SHA512d168d7e24da3b8da4ca37c2f3561175702b268fbef3423be3ede6634708f8148e3998b6fecfee6d017713dbfe8d874d2b96662d32fd18d7b21784a436b6ac028