Analysis
-
max time kernel
31s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2023 16:14
Static task
static1
Behavioral task
behavioral1
Sample
08439699.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08439699.exe
Resource
win10v2004-20230220-en
General
-
Target
08439699.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1532 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1592 08439699.exe 1592 08439699.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 08439699.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1532 1592 08439699.exe 28 PID 1592 wrote to memory of 1532 1592 08439699.exe 28 PID 1592 wrote to memory of 1532 1592 08439699.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\08439699.exe"C:\Users\Admin\AppData\Local\Temp\08439699.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782.0MB
MD5d47b1121c27ff835a9f315720c32a1b2
SHA163b61c2fbd431b083953075f0e44493b43856324
SHA2565904b02260cde3849b8892ff154ed0b58b1c7800c700b63bc79e3d16a849597d
SHA512f216c008c3870fdc7ae66f38fbfc70a50d546e20803516454ae875154c65a508fa573f58e1a25bf03467226a405e51fb5b42055a31b8cc185df6fedad6670f18
-
Filesize
643.2MB
MD5ab79fefff89222e8dd3598277adc0766
SHA10b1b4b49848e8ea7dd92fea80303a955f67ce07f
SHA2564e6e19c8cd2bf70335555c82ec96416656e27edf021e220fb1bb6aab586c943d
SHA5122984cc2641fa4f5e26e2767c30ee06fbeb8f222fdc3bade5be3df4cf37c10cd6f947a33cde7b9d05be8af9bad95d464c007509de9044d71d09f24c7e07a05835
-
Filesize
620.6MB
MD5a1ed8bdca9f51338ea1ffd61e8a10884
SHA17366825e741502a16ea8963c5497f9fefecce77c
SHA2564f9a0d135eef57cf21fd84bd56321417952fe7905159d92e41c91f3b34307df5
SHA512dc878c7d347d114c6bf4cb07b5dbb7f0650a6752fddc93eb6ff5e3226e6936324f5620a4868df3d9af56673a7c8463f65af67da5eb100d8e016fbd7da799952e