Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-06-2023 12:10
Static task
static1
Behavioral task
behavioral1
Sample
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe
Resource
win10v2004-20230220-en
General
-
Target
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe
-
Size
1.8MB
-
MD5
a00e64fb477f056d15dcbceb861f8439
-
SHA1
cc43e797973ac8dccec3f28c7090942804f5a271
-
SHA256
83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616
-
SHA512
588f594c915df09aaad467a31648852f5279afef0706243560266dc3adc591d18860f052bb557a3da62c6b425dde68d45162f161da75b30ba6fdfcabc7d0c2fb
-
SSDEEP
49152:aTDjb1Kvdt+v7Bg98vR7NWvT+V6G/XW/yjhw4:aTPbsFtJ857NWL+8G/8yFh
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1232 83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe 1232 83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2012 1232 83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe 28 PID 1232 wrote to memory of 2012 1232 83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe 28 PID 1232 wrote to memory of 2012 1232 83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe 28 PID 1232 wrote to memory of 2012 1232 83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe"C:\Users\Admin\AppData\Local\Temp\83a7f9488aa65bdf7d74aac8ce9ce3468725a40a26bc2c560758473403f99616.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
568.9MB
MD5df3581dcb518e96770d2f80675f94995
SHA1ea548127b4176beddf455c9636d7bcefac5a4678
SHA256546c1fcc304c70e51187d461a4f68542f748018f57d7b7049eb929d6d05b97ac
SHA5122a9609312ef8b9084ee9e0c4afa2ebf14afa374ab91fbdfdd1c83073b71508d45305548dea29653580e3a25c30105bf15cc5149bd6fdc0e6c5f48269baf02d0c
-
Filesize
591.5MB
MD59780c984cdf7bdb9ff682dbac374275d
SHA1ed2a300224357d58ef6a5f3b3339b6065a0830e5
SHA256fe6eb9c42c74f2831beeb86d4bacd75e2cdb45381c90554252fcb2f964c83ee2
SHA512f07c5d7fb356fb6e445baeac521633cbb3598cce8774529cf6197c7be205bfd7ba0130537c4f2d4391a16f2b7e7f534ee1584a23ef286dae4cc73f1153191fd6
-
Filesize
301.6MB
MD514afa7a6cf087854aecf8fa0383f0f93
SHA1ca51a74783830a04a8a1b18cf0f3c15e0dffd5ce
SHA25616a82601557926557115c4b87184489eb8afdf466914bee367badfa84f04e1fc
SHA5122bcfd3ad1bcc1d857751601323e0abd6fb145a87792de9db5323fefb270d67f5c0a0d5f26ec89c25454075e9c14e4c1aa16c88b8a6bbb93adebb94f9fe07cd77
-
Filesize
513.2MB
MD5cb29aff8a2fd710bfe52e672c459e748
SHA1038b9a6d4ae0ce4a3364aa48eecb55634ededd5d
SHA2567e0f2c8b698d1aed2495e7f55ea9ce690272b027be0872294b624f04b1ba0215
SHA512bfbd3f5267d17daff7c0949674b245603293cf61281916e8c146346f820d0a85b0d550ca66a59173294a3fd46987a21d7d317c9b6597c02ab755502917eb4765