Analysis
-
max time kernel
31s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2023 15:44
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1236 conhost.exe 1236 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2028 1236 conhost.exe 26 PID 1236 wrote to memory of 2028 1236 conhost.exe 26 PID 1236 wrote to memory of 2028 1236 conhost.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735.0MB
MD5b1fbfb8d4af0d88e96571caef2ea97e8
SHA18dcf66df91b94e8d5da115a27db08065d871e7e0
SHA256cfc6bce699bea8d8ec7e75ae35c19ed352e68567c5644820eb1bd82af9a0dc8d
SHA51281fa267b18a2af8ad030375579be161b37ac2b7c22ecbf393b432efbf53e16e2a04afa8a3551b0c8a6201383952c8cdf93b8231f06ed0ddccc3133aac078386c
-
Filesize
735.0MB
MD5b1fbfb8d4af0d88e96571caef2ea97e8
SHA18dcf66df91b94e8d5da115a27db08065d871e7e0
SHA256cfc6bce699bea8d8ec7e75ae35c19ed352e68567c5644820eb1bd82af9a0dc8d
SHA51281fa267b18a2af8ad030375579be161b37ac2b7c22ecbf393b432efbf53e16e2a04afa8a3551b0c8a6201383952c8cdf93b8231f06ed0ddccc3133aac078386c
-
Filesize
735.0MB
MD5b1fbfb8d4af0d88e96571caef2ea97e8
SHA18dcf66df91b94e8d5da115a27db08065d871e7e0
SHA256cfc6bce699bea8d8ec7e75ae35c19ed352e68567c5644820eb1bd82af9a0dc8d
SHA51281fa267b18a2af8ad030375579be161b37ac2b7c22ecbf393b432efbf53e16e2a04afa8a3551b0c8a6201383952c8cdf93b8231f06ed0ddccc3133aac078386c