Analysis
-
max time kernel
66s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 14:54
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1448 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 conhost.exe 2036 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1448 2036 conhost.exe 28 PID 2036 wrote to memory of 1448 2036 conhost.exe 28 PID 2036 wrote to memory of 1448 2036 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1448
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74.1MB
MD581e830daa89da11338d27931859d7f80
SHA18b60aca7d9b1f65c096d40dc65664265d222efd1
SHA2566e7eaa69653806d31d9172f7c52bfe870fc104e70a52ab716d05ae82514700f4
SHA51225dceefcde0200f8e0714c99b6d59b99cce3d39edbef0ea5861815155e460da0ee6d4fa58f6229ec2f60bad319223b0f72452026fba0c9b3862ddce656c09e78
-
Filesize
74.0MB
MD54caa3631eb810d3f166b256cff1e404b
SHA144853a9cd8f8e5938b19226f900a25d52e684bed
SHA256603697df6b213afaa246b2465f91ac84bb0d9fd3b5f9acdd7b5473f79fcb8936
SHA5122b342fb79b964f3b06c6af89f41bf0286549becebb0c9fe03844158296ee4a9f7e03d67f990ddacde3c3b801888c520408ec298e700fa51884e2b71e1dd68b00
-
Filesize
74.9MB
MD58ccdcb5961c4afcd5a2dad8b318fbbee
SHA1067350f0181f76b3c71338cb5babb7062bd0112b
SHA25673d885441f5d5815231f3c2ca44a8d9058abd3e41cde8395f55a7a77da8bc908
SHA512cec028a4afc923bdfc90661a2003fe84fa9efad10f84ad37cbdbad99659fa1fa96dd1edac11c14ad98b22dd85ec8fc6bfed8d3bdf05267a273ae1d0e48e3dbd2