Analysis
-
max time kernel
68s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230221-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1968 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 conhost.exe 1992 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1968 1992 conhost.exe 27 PID 1992 wrote to memory of 1968 1992 conhost.exe 27 PID 1992 wrote to memory of 1968 1992 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648.2MB
MD54d6bbe786c0a5789dd95410b4daf8cca
SHA12b2da89137f9b6d885d2200012b7ab72b2abacf3
SHA256250d043236ad39957df6c5255ec2a031f1afc3f560260152925301ea9fa06155
SHA51204111b898f592dfa895120b87caed2e8f59b4d9c4c789d0f619613281f22fdc227b173059011869cd92cd4688a8005a96e69c81d29a0a06a30056eb53861cf25
-
Filesize
589.4MB
MD5e1ff4caee6c80e4f74f6e329e51f8cc3
SHA1061e3becb2af8617c07a8d909b54433cc1c88da6
SHA2560a076b79676ccf1f5680c478a1e121b9b447f3f17b879f3436a3b29143306756
SHA51242cf018653f654b4fc2a1efe1322a5776c5afff7941b02596de01b581cec5dcc53b937a1b9e6ccbf7fafe3fe967eb084cba2a76789b70f7f4794289c6f967592
-
Filesize
618.8MB
MD555e0708e1ca71eca406dcf42d7487ec4
SHA189ccfbe349e0ae4d26fe405c78fa43410ef42065
SHA256f28b1d740caaf71761c37b9ea975d1b88ae76391f41f66dc19ecf3a003c42903
SHA5128d133ca5ff1715fc8dcfa894251399b3032259e02ae413904a8c59e952d1b1a2c5096ddf020c711ad470e75cf4d3ae3c98aa52154aad9c3360421d669526f551