Analysis
-
max time kernel
30s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-06-2023 11:11
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1652 conhost.exe 1652 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1632 1652 conhost.exe 28 PID 1652 wrote to memory of 1632 1652 conhost.exe 28 PID 1652 wrote to memory of 1632 1652 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
734.0MB
MD50fbb52dcb7291f2c44a07d872e899dc5
SHA1344feda5f106f570c36bed95ead49ddf64de6db4
SHA256edf18514ff5dfc833dc07f9c6ac4fce09e46eb5f32061cc7415660ff5d6e95ee
SHA512ec5630ac15b07bf8cfb3d8bcbf7ba3a5ed7245f2353e514522bb462da8a20969cf936c88e2aedff95f3285f2b554c72956ba20f9e3211055628da5348c9165b2
-
Filesize
629.9MB
MD51d737fca00171be0246c8dbe8d6ddbb7
SHA1818447f157fc460c1390f84aa28e5d2bc31933fa
SHA2561261d8380c105303759f75e2af9b022a4558181a05efb2c8e2e5762d436a55f9
SHA512c4d014ba98f244efe8333544d2eef9f7cfeb55521389d7fd2418ac6f1245a1d8b16c4bc0703232b5f0375c8e64a9877b25d2f0a2b300d219cef8aa551e9bb395
-
Filesize
614.5MB
MD5503c261f278b5303a5666e5a54d756a4
SHA1ece97cbf07626741dd52a66dbe6f8ffc1e578a07
SHA256f535d4b2c033bb0041bf94bf8106cba53c491c84df369e52879e47039fd3e14d
SHA512836e3fe3608a8b152bf33eb1367095d390e7b91e32321639b7f684332e0fec2d666dd7787f5b05fc6b5de914937e169d2db7fcc3a48aeb984e818875f93f103c