Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2023 19:15
Static task
static1
Behavioral task
behavioral1
Sample
a00e64fb477f056d15dcbceb861f8439.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a00e64fb477f056d15dcbceb861f8439.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
a00e64fb477f056d15dcbceb861f8439.bin.exe
-
Size
1.8MB
-
MD5
a00e64fb477f056d15dcbceb861f8439
-
SHA1
cc43e797973ac8dccec3f28c7090942804f5a271
-
SHA256
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616
-
SHA512
588f594c915df09aaad467a31648852f5279afef0706243560266dc3adc591d18860f052bb557a3da62c6b425dde68d45162f161da75b30ba6fdfcabc7d0c2fb
-
SSDEEP
49152:aTDjb1Kvdt+v7Bg98vR7NWvT+V6G/XW/yjhw4:aTPbsFtJ857NWL+8G/8yFh
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1784 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" a00e64fb477f056d15dcbceb861f8439.bin.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 19 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1784 3208 a00e64fb477f056d15dcbceb861f8439.bin.exe 82 PID 3208 wrote to memory of 1784 3208 a00e64fb477f056d15dcbceb861f8439.bin.exe 82 PID 3208 wrote to memory of 1784 3208 a00e64fb477f056d15dcbceb861f8439.bin.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a00e64fb477f056d15dcbceb861f8439.bin.exe"C:\Users\Admin\AppData\Local\Temp\a00e64fb477f056d15dcbceb861f8439.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771.2MB
MD5fa1cdfb494e1a231ef3e1d4ea64cb9be
SHA1da96869ecba5004ee69651d592f98012b56a4a9b
SHA256ef842d7838ef2f0870bb4a1b736695f2f5130598acf3c45d6b5637b5c32f75ed
SHA512c1f684cb8c90d3a41aa782f54f847c0f8d28e73090aff83b2e49c9c9a68ac36b64df059758ee8c7eb0db9b818fcc0a138633bc6d2aab6692b0f6cc88323b208d
-
Filesize
754.0MB
MD5b6fac53bdf81dd59301a0d1541660214
SHA17e7f30f25043c7d538caad62761e40e772864c79
SHA2562265c1580a169c401ffeb1d28996272017ab8086b7331f3b30ad05637ad73c5d
SHA51240a73584f2db0f7b429011c659958ffe774148c50826caaca34f91eea8fb6d927d2a4adb040611a5c474e4c91875d218998e4294032c9c13db952ed557ebfddd