Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2023 05:03
Behavioral task
behavioral1
Sample
68be007bd3fa09d26fcee584a9157770.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
68be007bd3fa09d26fcee584a9157770.exe
Resource
win10v2004-20230220-en
General
-
Target
68be007bd3fa09d26fcee584a9157770.exe
-
Size
3.8MB
-
MD5
68be007bd3fa09d26fcee584a9157770
-
SHA1
6f191c0587c8055f26367f25ce0f7787ca272714
-
SHA256
71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
-
SHA512
f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
SSDEEP
49152:VeCseICR7NWm8qpHakXvLQh0/50OicF5pDRXxRv0VF14L:VeCrXv0W/tpDRX5L
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 444 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 68be007bd3fa09d26fcee584a9157770.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 12 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1380 wrote to memory of 444 1380 68be007bd3fa09d26fcee584a9157770.exe 83 PID 1380 wrote to memory of 444 1380 68be007bd3fa09d26fcee584a9157770.exe 83 PID 1380 wrote to memory of 444 1380 68be007bd3fa09d26fcee584a9157770.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\68be007bd3fa09d26fcee584a9157770.exe"C:\Users\Admin\AppData\Local\Temp\68be007bd3fa09d26fcee584a9157770.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
845.8MB
MD52dd6dafea4f69fd9fe62faeca57752a3
SHA124bf47f999210e451562d8a0b922877680b379f7
SHA2563caa0b51fd20fb28c102fc18920ee10bc04874822397e57dab6f384e68583e24
SHA51299c6e171e76411a0fc99ecb00e76c182b67ca57c6cbcf8eb7b31d2986550b8e53c3ba0eeade4fabb5b66babd30fbfbef5db6a114b99168ea137a5af5932e1e9b
-
Filesize
845.8MB
MD52dd6dafea4f69fd9fe62faeca57752a3
SHA124bf47f999210e451562d8a0b922877680b379f7
SHA2563caa0b51fd20fb28c102fc18920ee10bc04874822397e57dab6f384e68583e24
SHA51299c6e171e76411a0fc99ecb00e76c182b67ca57c6cbcf8eb7b31d2986550b8e53c3ba0eeade4fabb5b66babd30fbfbef5db6a114b99168ea137a5af5932e1e9b