Analysis
-
max time kernel
31s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 05:03
Behavioral task
behavioral1
Sample
68be007bd3fa09d26fcee584a9157770.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
68be007bd3fa09d26fcee584a9157770.exe
Resource
win10v2004-20230220-en
General
-
Target
68be007bd3fa09d26fcee584a9157770.exe
-
Size
3.8MB
-
MD5
68be007bd3fa09d26fcee584a9157770
-
SHA1
6f191c0587c8055f26367f25ce0f7787ca272714
-
SHA256
71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
-
SHA512
f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
SSDEEP
49152:VeCseICR7NWm8qpHakXvLQh0/50OicF5pDRXxRv0VF14L:VeCrXv0W/tpDRX5L
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 912 68be007bd3fa09d26fcee584a9157770.exe 912 68be007bd3fa09d26fcee584a9157770.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 68be007bd3fa09d26fcee584a9157770.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 912 wrote to memory of 1996 912 68be007bd3fa09d26fcee584a9157770.exe 26 PID 912 wrote to memory of 1996 912 68be007bd3fa09d26fcee584a9157770.exe 26 PID 912 wrote to memory of 1996 912 68be007bd3fa09d26fcee584a9157770.exe 26 PID 912 wrote to memory of 1996 912 68be007bd3fa09d26fcee584a9157770.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\68be007bd3fa09d26fcee584a9157770.exe"C:\Users\Admin\AppData\Local\Temp\68be007bd3fa09d26fcee584a9157770.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522.4MB
MD533012965bae0c68545e343a668415a79
SHA118877e7d2f3222f0665b997824de9633940a1cc4
SHA25662e36d8ff555b3cfc2f2b5e03b157115234f1a94508561fb0910d117902d3288
SHA5127de749cdf05533a51e79255261264023b1ced9dfa7e351d0b6adf66fe1564db5ed7141c173fef6695f5fa8264aec49dbf90669664f3d07fd523a1e1812bb7237
-
Filesize
529.9MB
MD5eebe83f3c53beb4955a3f7c1577a03cb
SHA1365aec3f30db511b2e1e2e11de66c3d443852ac3
SHA25609936684b6cd7071b643be4aca8b218d76e91a0ff3ea08c0b0e179fa15e5dc91
SHA512da04e536ab5d372bccac3dc2c1ba24fc7293cf573409b690371278ce5fe6cfcc8f753cc81932ce63d7dd88e36b9ba4b1da9775900c0b86b2c477460a72bdd487
-
Filesize
333.9MB
MD591de60ebe285f005e808caf9e4d72383
SHA18ca415bc7847b5ca721c643442ce8cbcf6c98913
SHA256884e187d6cb3522f4ee53bbe5d37ee6f942b721ce7550b5ee0b8e028f69730b1
SHA51270767358c00a0832757c359c07ca6808b8ae89fa370e381321988a09907034dc97ee0a0188d72c22360adc4fa9f9345ea6e17104436f9cae0bb6ee9424203b3f
-
Filesize
473.6MB
MD51c3b02018d0a654d52070aca4c0cafd6
SHA1eab34947bbda959ef6086f579613e9cab5355283
SHA256399df1cc7063e5e0ee5a7ed369c8cf2d1606c0876ed16ccfd4574067698f68f1
SHA512d7c11d5a54c4e1c2241e905d39f91dcc70cc78bca1f9c4e9a7d74d150dcaa71d93f1f9532fd33d30c840344f2d111f6df4e28145112b27bd0cadb68a4aa6f2aa