Analysis
-
max time kernel
30s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 07:48
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230221-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 916 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 844 conhost.exe 844 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 844 wrote to memory of 916 844 conhost.exe 28 PID 844 wrote to memory of 916 844 conhost.exe 28 PID 844 wrote to memory of 916 844 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732.0MB
MD56c9fd33521275ecdce20d7b52f74a3f1
SHA1f8189b10f64891bf91783d4ec09bbb32c78af69d
SHA256c7fd4fe21f182067efc6474ea6c415fcb25e181cc64d311230948f7864565bca
SHA512d55ee33d00574acdcada2475786fe6dc491fc400152c8df15291a2f409152fa2e327eaaf21df3709d5d4ed79eb45a20c2041bd1c9a4a6ba7d60171163659cb82
-
Filesize
598.1MB
MD5cb35f772de5c0798e0f1889b33d74be1
SHA1573c170262c9afbacd71769ffc253293da68d2ae
SHA2561e935394e63c052375819a76e3c5c75fc0fbd09f495ea1af9bb90b9d8c445e7a
SHA512141a1e4e52b23e64786a15e355acf69a036eb1d8a4c5a9952bb04c47c28054c61ffb36e27a23c96d1e7591a616a8b508feb2e28a6a07a114ef5d2f3d464f5db5
-
Filesize
593.2MB
MD57b51bd92669358c6bc70cec9e7b9cac7
SHA180dde8d237eee68a859016c3459e165d1409bc51
SHA256c3b3e8193768827e6b50e44c16cff37504a446e8f6ed6c7d3e025151fa5ad786
SHA5122ce70cf3b52581325fe9b3d699bbcde9b1432c6268218121c168ffe34b452854b4d4ac343e870b5b18c9256bb7932b2ebc819f5b112a4c96f7dae109e24ffb4b