Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 09:43
Static task
static1
Behavioral task
behavioral1
Sample
ccf4763882256111f713d881ad7d9aa9.exe
Resource
win7-20230220-en
General
-
Target
ccf4763882256111f713d881ad7d9aa9.exe
-
Size
3.7MB
-
MD5
ccf4763882256111f713d881ad7d9aa9
-
SHA1
507297f20fd3fbda9a8cd426bbcffdeb8e4e8ab1
-
SHA256
59d9b80d021e8dc40f387d759ce6f77c56330a07352c0238f1768116cf80ebf7
-
SHA512
53d20ba5739d1205be1b16966d981881ea8c9b0b8c9880b1e407f354e025b6ccae61e653b78d6a9e3d9c5023ff09143b365545c411809b645ac24f8620580416
-
SSDEEP
98304:o+bU8AtKpng3RiQT0Q9zc7J7MRNCwZMGzcf+UctPK0:o+bUVtKxg3RiQ7z0J7MuwDzcGUck
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ccf4763882256111f713d881ad7d9aa9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ccf4763882256111f713d881ad7d9aa9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ccf4763882256111f713d881ad7d9aa9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 1 IoCs
pid Process 676 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 1536 ccf4763882256111f713d881ad7d9aa9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" ccf4763882256111f713d881ad7d9aa9.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ccf4763882256111f713d881ad7d9aa9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1536 ccf4763882256111f713d881ad7d9aa9.exe 676 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1536 wrote to memory of 676 1536 ccf4763882256111f713d881ad7d9aa9.exe 28 PID 1536 wrote to memory of 676 1536 ccf4763882256111f713d881ad7d9aa9.exe 28 PID 1536 wrote to memory of 676 1536 ccf4763882256111f713d881ad7d9aa9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf4763882256111f713d881ad7d9aa9.exe"C:\Users\Admin\AppData\Local\Temp\ccf4763882256111f713d881ad7d9aa9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725.7MB
MD5875d35a2b7877a838d061887b226cd23
SHA13d8574ca6f15bc89791781ffe5ebefe3b264272a
SHA256c6053e71aade964c263a7314852abb783be7a07098ca7967bdd783d942d7c249
SHA512b362e27a97baec251c101a749b4c9d8ed46776415043afe1b924d238ffe36e0b6e6c8213461051e26b5fbebd058ab9c27f8484e92e699be360291099b7100b15
-
Filesize
725.7MB
MD5875d35a2b7877a838d061887b226cd23
SHA13d8574ca6f15bc89791781ffe5ebefe3b264272a
SHA256c6053e71aade964c263a7314852abb783be7a07098ca7967bdd783d942d7c249
SHA512b362e27a97baec251c101a749b4c9d8ed46776415043afe1b924d238ffe36e0b6e6c8213461051e26b5fbebd058ab9c27f8484e92e699be360291099b7100b15