Analysis
-
max time kernel
293s -
max time network
283s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2023 12:32
Static task
static1
Behavioral task
behavioral1
Sample
mstscd.exe
Resource
win7-20230220-en
General
-
Target
mstscd.exe
-
Size
4.7MB
-
MD5
4eee6a99eb6e64650469196952f9f9fb
-
SHA1
f526aa5b0e48790473f9da6e4dbdfe874158b149
-
SHA256
b17670d28e2cc95784b4bb1ad7a8b3eae5e69b27896f7b755f8e7550f767e116
-
SHA512
31c5250dbb80588121b6d01c6344e94a2f7fb06501d00af7c339a4c5694dd850779de453e8f05279c933e4d375bbf508714730bc339622ef094a2b5d9edc929d
-
SSDEEP
98304:JPoB48l+avKBBXXO9G4/YZHEIkfhsg11omqL2b8UnuaAkLcWO2yb7Mw5R:JQZl+aC3XX54/+Heig11IBAZAkBO2O7M
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mstscd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mstscd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mstscd.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 1088 mstscd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" mstscd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstscd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1088 mstscd.exe 2004 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2004 1088 mstscd.exe 27 PID 1088 wrote to memory of 2004 1088 mstscd.exe 27 PID 1088 wrote to memory of 2004 1088 mstscd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\mstscd.exe"C:\Users\Admin\AppData\Local\Temp\mstscd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720.7MB
MD58835aa8bc00d09df671e3a6ceead3dc4
SHA184121c6cf6262704513a025444324b5d050a1940
SHA25670b9a51167c08cca24d2da815f33bc0f75f873343c63e5f0247989b8bf9cf89f
SHA512b00f356035d9ad7b29a74022815bc63ad124b245f29694c400336b1035c2827016e04b91ca9518517182b56f572d15d29831194870a9fd988efcd4f9b3e00f4f
-
Filesize
720.7MB
MD58835aa8bc00d09df671e3a6ceead3dc4
SHA184121c6cf6262704513a025444324b5d050a1940
SHA25670b9a51167c08cca24d2da815f33bc0f75f873343c63e5f0247989b8bf9cf89f
SHA512b00f356035d9ad7b29a74022815bc63ad124b245f29694c400336b1035c2827016e04b91ca9518517182b56f572d15d29831194870a9fd988efcd4f9b3e00f4f