Analysis
-
max time kernel
29s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 12:42
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 268 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1264 conhost.exe 1264 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1264 wrote to memory of 268 1264 conhost.exe 27 PID 1264 wrote to memory of 268 1264 conhost.exe 27 PID 1264 wrote to memory of 268 1264 conhost.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
760.5MB
MD5e66aeb8a201634c28d384123b6db41ec
SHA1aa1c6560922a428a1f8d968a533fb88391e1fc9e
SHA256857f99f4a8619708b0a0c887fe663f83b7df4e9271052d6f95552cb29763afdb
SHA512232ac2a63e3f96b14a16ad829c626858ae19a024cca874244dc540e2593421eb788d358bf1378de16f568a936aceb6c8f6641942dec548000b3862c3d659d78b
-
Filesize
536.8MB
MD58cc0e1086f332b3c8a2b5b00f53d11f9
SHA1d203ca4e07e5c727542898d7612de35f589bd5b6
SHA256810716b87e1b8f5de5fa3807359951a121e4d007c69412b0961fed22bbfd74e5
SHA512d206177d299a109e0c9b6ac64e174985d23c84cb4cbf3c5006462526d8da5ed8c7fb0f0ea92d58c779a107438601c866fd807c43f1aa43657ff77f6eb4836e77
-
Filesize
506.9MB
MD58dbccfb96a6d6aec28706d3acaa05710
SHA1c86aaa3ed787c347d19cb0d0a66a596eee5574bf
SHA256429b30a2048cb037593a8583484aad53420010ef2deab59c0710f4329fad2242
SHA51202d16238d7f9862b523ad4971991bdb30501eae6eb569c16f134841da754f167685851cd868c0d949d7d07dfd1d07e476a011f25b83337bd447e903c516407a9