Analysis
-
max time kernel
26s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 10:37
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 880 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 912 conhost.exe 912 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 912 wrote to memory of 880 912 conhost.exe 27 PID 912 wrote to memory of 880 912 conhost.exe 27 PID 912 wrote to memory of 880 912 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554.9MB
MD5f0974f8fb7636fb3810225c48b990490
SHA184de500be6bb64ce2a0910486dacde4c3f7bfc77
SHA256501c4c9b57e6ff5c443a089e9fc3b1eaf4cac010dd66d37bf3f8f7e60fc8eb5a
SHA512b0beaf53249148721cc457024f9cab640d934a6f6bfaa2317c175d6f514177d972ce9d45d9145b03f285968333cbdba7036e5cdd43f450e3ce5397df87e64c8f
-
Filesize
555.8MB
MD50df1ed8f08d7c6e7926cb617bb1fba42
SHA1bb5e85217f36f4613a8d2cd6047f1a993b455f95
SHA256e0812dee46cda4b09676d967f444575563c1cf702e54d6b0c73576290aef3f54
SHA512d3840fa4fb7969f3273a8596cc2e595143f668b1443b3cb66b727766325141ac7cddc676e1b65713d0a1969434a2bf1e4a6ded18e8c19e0048714ba8d1fbb8b0
-
Filesize
538.8MB
MD5417f0f9b09fa38d9e923d3d338627207
SHA1c3678cedc26c3e44480a405712b57060619f293b
SHA256765b8510283f843531d1dabc53fccfaa9fe76a853100f8c2ff3d4722ed633670
SHA512d06e938d1251d6a090d87042bb943bbb984dd3e0794f0f01a12ef848306ccc206045c963ecd2c24f0cf06792534631ff3cc35f1d5539703e7edb560f0066ab45