Analysis
-
max time kernel
66s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 07:48
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1232 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1344 conhost.exe 1344 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1232 1344 conhost.exe 28 PID 1344 wrote to memory of 1232 1344 conhost.exe 28 PID 1344 wrote to memory of 1232 1344 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425.3MB
MD50d58e4b5dc3f08a26730b78083a6ed7f
SHA1dd7f9cb016237383b36a4ed83280aed00c54df7f
SHA2562682d829b3ed51f178329882430bed246e67cbc831ceb22498787a7d26f6a332
SHA51235cb67353722d67e790aecddfeba8a6cbe8fceadafffbd4bf94deba118bbf31fc2b64a8f68a452b28a26d0b2a9910250b0346ff1638864638ef75c96eb62c1d0
-
Filesize
348.8MB
MD5cb2969f48b840390b77956e2a3d3eb04
SHA197dae33f7d670433fdff70dea7b5a210dee60225
SHA2563a888ab4de94a7ddbc65fc4c1fbc67203770514b9b72a9965dc8060ee8016fce
SHA512d52a2533d10a31e1c03b77d577160fe51850c64f281772c54dcb20011ca05f851d6df9f185286421487a1541dc20e0ef5abad1b983934d39342aa233d6f15486
-
Filesize
357.4MB
MD5d598c17ce760f855466a45700d89cedd
SHA1803ca1b38d604c4086f46e1b8e42ced89265d866
SHA256dd6c8287506a68c9911fa6ba57dd508ac12ce88436ab9e252ec893d2de91b682
SHA512de35fa3ea0f9bc300fd03aa246e84d9be2c895545a9a0e63c4faf0b849538172cd2363d500828b5792d009483d5526e33a08f26a4ce20199972cc74dc6cf0768