Analysis
-
max time kernel
28s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1104 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1232 conhost.exe 1232 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1104 1232 conhost.exe 28 PID 1232 wrote to memory of 1104 1232 conhost.exe 28 PID 1232 wrote to memory of 1104 1232 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
778.0MB
MD5c8104fb03408ab204caf192fa226d48f
SHA1d436fc2a2bff51817d8589a9fefe1205aee4350d
SHA256fcca3c7e71b5d76da3e66af2be2361c99b34278de7ed33b982c228dcdaf0b8e7
SHA51246341e13ed4a778fa8868bbbf2d16a3365122799e750fa1361f5a87920113945e9bd61322481df030db02aefb7734b39f9f96e8298e81000a1775ab304e1ae48
-
Filesize
547.8MB
MD506d12b1adc1d4d903b2668208554c207
SHA1fe8d8283201d0678d3d22e583c69cded8e82183a
SHA256458a95a8ab97662acba907ff37128ae22584e7c9e3022aac2ffd66071c189b2c
SHA51270ad7dc3d16e3a0cc58d041e5369f5963ac990474080580d783f31be6f7eaa545e052419c215c3908d234599147d997b067836ac972eeab7f2c6de45d8358396
-
Filesize
534.5MB
MD5df967afcbab27fafc789ca0edce6a5a0
SHA107abcef216392d492637ee43c5948bdce98c82c5
SHA25647453d726f0e158352dbd3e0cbc55ecfde350d7ba705117c54a64d0b4bc4fbf1
SHA512f6ea5c8c34e667f084c05dc73e6eee2782338791173dd5925b8ab7c9a591b19110237408bd48f85ce1b483609827179680cc0407d8e6c2130a2771ac67b907d4