Analysis
-
max time kernel
28s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 07:47
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 872 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1520 conhost.exe 1520 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 872 1520 conhost.exe 27 PID 1520 wrote to memory of 872 1520 conhost.exe 27 PID 1520 wrote to memory of 872 1520 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:872
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
567.4MB
MD56d4b8dc05a53d9bd2b179c4e7d6d7d91
SHA12d4129fd4bdd1dec2ecc1ac312b7798f3e7e8b73
SHA256a7f0011bd3e5b4be52e34fdc2ac53fd1c48676be8c128bf5e40b1d4fd4334042
SHA5123d4a9b41c4443afd19fb38fd7ab26f4b90818ce68b393bc124bfb185caad7feb26a5d85945785cf1cf7cf264cbd55c4d2f20785c114842f85c95ebe57b23d24d
-
Filesize
733.2MB
MD53527385e5183bcf3c03593c75ea459f7
SHA19c64de4515388c3125170f3fd22dc1c2af6f774f
SHA256ae1dbb9cc848daf41ab5ace0915e76211e491f0dd777c60d951c3a8813974a9b
SHA5129f7a6c7d7877adf64935d4db5061450e7e5bba7060966d81ea024b658c645c594d0563b7e6941a173ee027ba51edcf57a44bb264d987756f26dbfa0c484d2c36
-
Filesize
571.9MB
MD53a1cd3efb9958bb190c650efd17e4d0b
SHA1f054c49f1b70ffb6fd9e7c812e4cd75ad1b97370
SHA2569170f0b50492ffb52b578411d93afdcdf606c30608dcde4f90aa337cddc8ea16
SHA5125864a60cb2a73aefe38914b4bf38ae7213fa19fd31522e6686e9e85c06703984e0e03f3809fa29d26ccce8afffaee647c6a2e069af838c11709da8665f51fc0e