Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2023 07:15
Behavioral task
behavioral1
Sample
08169599.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08169599.exe
Resource
win10v2004-20230220-en
General
-
Target
08169599.exe
-
Size
3.8MB
-
MD5
68be007bd3fa09d26fcee584a9157770
-
SHA1
6f191c0587c8055f26367f25ce0f7787ca272714
-
SHA256
71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
-
SHA512
f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
SSDEEP
49152:VeCseICR7NWm8qpHakXvLQh0/50OicF5pDRXxRv0VF14L:VeCrXv0W/tpDRX5L
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4944 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 08169599.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 18 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4944 2748 08169599.exe 84 PID 2748 wrote to memory of 4944 2748 08169599.exe 84 PID 2748 wrote to memory of 4944 2748 08169599.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\08169599.exe"C:\Users\Admin\AppData\Local\Temp\08169599.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
833.8MB
MD5b93cea2a540591775184bf893573df38
SHA1543195c7722119fde43cfe544e17642364b05db7
SHA2561da36d32be008f75104c3351d2430bf93088efafddd8ef998e6f493c82b91a44
SHA51255048a0c2eb93ac354eb2d41fc4df67e079bc29ff96b8e424c7d818c994c5e9e35243f1fde71711760ba24f5e0a4271814f5f0a6964b345f45158ebd4bbb80a6
-
Filesize
833.8MB
MD5b93cea2a540591775184bf893573df38
SHA1543195c7722119fde43cfe544e17642364b05db7
SHA2561da36d32be008f75104c3351d2430bf93088efafddd8ef998e6f493c82b91a44
SHA51255048a0c2eb93ac354eb2d41fc4df67e079bc29ff96b8e424c7d818c994c5e9e35243f1fde71711760ba24f5e0a4271814f5f0a6964b345f45158ebd4bbb80a6