Analysis
-
max time kernel
26s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2023 19:49
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1464 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1624 conhost.exe 1624 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1464 1624 conhost.exe 26 PID 1624 wrote to memory of 1464 1624 conhost.exe 26 PID 1624 wrote to memory of 1464 1624 conhost.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1464
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
806.0MB
MD541490a8ea96edf47172ed2f49bd97629
SHA19cd00a9b0d972f81ecc547f6283c110c5b676979
SHA256750bf279d19afb6fe558de4e9b236bd84d574bf52f2e6f253e17919d240ff656
SHA512408d32bb4858d94df986259a39c544fe75da8ded615d1f687ea1c028b759f88faea0ebd3f94017b4065def57ac6877cb1890f953b82ca44f0f0068af43886cb0
-
Filesize
569.2MB
MD507aede7524360444e77596a40023211b
SHA15e3358a488fde4bc1d7f38c669f8760680f1fa69
SHA25672ed7b2695a2d16ef585a2c9bb2d7a61936be88108eb353354c1407c15c1628f
SHA512cd735b72f5ddda8aab70919a9bb69e84ee78b6c7a5eb200e96a161d946dc808062ae795d9cac54dfc7ec6ec9ade2376d2bbeddc32124a8220374db441d6f5626
-
Filesize
602.7MB
MD5ece3aac294115316b56b1471a6df9f1e
SHA11da0655870a5bcb675c44e943e6e5ba3a42c5970
SHA256dcb58c0a7f0fcf0d208b12d4dad29a55972b73c86f2d7715fa966a4486e7f481
SHA5128203ed931c3590a39164f13ffd97a5a0ae878dbd5459773e05707aa81f3c90513ea9bf6c97f469993b92c113feaa09965c332363f7ffdf15a2ab4ef847356894