Analysis
-
max time kernel
73s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2023 10:39
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1420 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 conhost.exe 1224 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1420 1224 conhost.exe 28 PID 1224 wrote to memory of 1420 1224 conhost.exe 28 PID 1224 wrote to memory of 1420 1224 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1420
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840.0MB
MD54cb8043c2853f205fddb76a1df29cf27
SHA197171dd6259e63eee6df5d35a75907bdbbc37f61
SHA256a2d08e31462396f1af8692bea43170d25599cfa635462510e4701f879145fa07
SHA512c0c9b758bdc921d818ddc727a29a67d66554cb28a052c4059c1db5024842f2d165260ded5be73969b18ad85c6561f083bc9b150f0ee4945523903f4e271459ab
-
Filesize
588.7MB
MD55394cffafde00c3d9bfa3d5dd2945c0a
SHA17b187f6638953547b92d79b6c651602a2f24e8fa
SHA2562f78c5c976b895634e33fa76aeebac3342ed254171a6bf771d55fb7fe22eaff0
SHA512e03de5c09eacbd5050062a10ba3b631ecc07e8c6418ce4fb2155b7cf8798324a925c75d87b4b582ab692230fc58bb9089c4769cc34ec8ca2b19103ac4321659b
-
Filesize
610.7MB
MD5801757aaebb956c196c29ffdab0f0251
SHA1c138171f609b82902efd930df1d5665a0e4a5f47
SHA25688ee7979360ad52ad175d24923e8e1f9a392374d1b6c1b2bd2df4fe30336fa07
SHA512d4d657737b256f27d5dbe12c9b90c9d7f7b42788380290fc7d930a1c46a0dbb2ad678a4669b6170d020e7ca02d1a5ef071ed51d8c7483cd8ed9d9ebef7c67976