Analysis
-
max time kernel
30s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 07:47
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1496 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1748 conhost.exe 1748 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1496 1748 conhost.exe 27 PID 1748 wrote to memory of 1496 1748 conhost.exe 27 PID 1748 wrote to memory of 1496 1748 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1496
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672.6MB
MD53eb8999f7cb67cbe3ffb928dbcc21d9a
SHA1762d212196746f54d3573d4401f42a31bc1989e2
SHA256b1e1a71e587199b7d2444c8964c273000def6a7cbd856928ad93ded1142ed16b
SHA5124370e4090a44f5dd0202203f8cc26c4e276c853ddd393e613d53f2e54cb30e0f74fb11772ddb569c72b18701b94452507e9b87c90058dc4f316c77805266f1da
-
Filesize
633.1MB
MD5eeac11550bd183e8a98acc51268af4f3
SHA11dfad15a55868b19e52850b74a91041cbbb2849d
SHA256f8a32506d1d5ede674c50cf13c9dbb663391305e0137f2add47a27aa573fd6d3
SHA5129f48f9c18ee87fdd699c98232b436becd20899c896a954e327c69e869dd39ecec9c4479c76e190aee051a5ad170d2d7f32e103fc539e7f6ff84b6ea033eb757b
-
Filesize
694.9MB
MD53d8234d4c030d2da8d0c494e070459b2
SHA1628030d232c97418b2e48d8cc3ee0b676554a482
SHA25667dab8fe569eafd0b782a742bdb44aa306d0d119b24ec79cc57dba1f3e564025
SHA512a1af059975db2175ec382cb24415eb106f1c3583326da636e7ad9711562c731dfc323b5faf8b6cffbd943094bee9deb486d29944520f1126d799f3d07c4c2435