Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 21:15
Static task
static1
Behavioral task
behavioral1
Sample
539a444f8dff3d9719e36fd9db31b799.exe
Resource
win7-20230220-en
General
-
Target
539a444f8dff3d9719e36fd9db31b799.exe
-
Size
3.5MB
-
MD5
539a444f8dff3d9719e36fd9db31b799
-
SHA1
9b4a836511afdb230888a1e2c0698c839850d8c0
-
SHA256
2c5c3ba7eba30cc358b40d494fda79d9d2a6df152bdb7eb1aceb36f3fbcf60c3
-
SHA512
7c14e97ff23cd34f302658a498e26d694b1d501390536eee51f9e9e2bfc68306b59362d66b7c11d364d2cc7d2e6ed78912b505476e78ae2e928fd859e2c104bd
-
SSDEEP
98304:GrZtcyQgVa9BjWmic5fcD75vuHgdtZgC:GsRgVa9ltc35WHG7
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 539a444f8dff3d9719e36fd9db31b799.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 539a444f8dff3d9719e36fd9db31b799.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 539a444f8dff3d9719e36fd9db31b799.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 1 IoCs
pid Process 572 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 836 539a444f8dff3d9719e36fd9db31b799.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 539a444f8dff3d9719e36fd9db31b799.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 539a444f8dff3d9719e36fd9db31b799.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 836 539a444f8dff3d9719e36fd9db31b799.exe 572 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 572 836 539a444f8dff3d9719e36fd9db31b799.exe 27 PID 836 wrote to memory of 572 836 539a444f8dff3d9719e36fd9db31b799.exe 27 PID 836 wrote to memory of 572 836 539a444f8dff3d9719e36fd9db31b799.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\539a444f8dff3d9719e36fd9db31b799.exe"C:\Users\Admin\AppData\Local\Temp\539a444f8dff3d9719e36fd9db31b799.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756.5MB
MD5b6ab4e8d2506ede314434ab132d4e53e
SHA1808b76127ebb8788c1e53b65ba81c2f56bb65102
SHA2564148b3841bef5d6e4d77952cd6d8d4212c293351518ca40ffb93ab4002647bf1
SHA51204bb26a7e1f3070d240d13d4e7dae8c4fa287aae8bb897708b0e018c0d38a843caad5f9fd4faa58ca711c40c859c35f7e14541f20205f42350d27806df2abdb4
-
Filesize
756.5MB
MD5b6ab4e8d2506ede314434ab132d4e53e
SHA1808b76127ebb8788c1e53b65ba81c2f56bb65102
SHA2564148b3841bef5d6e4d77952cd6d8d4212c293351518ca40ffb93ab4002647bf1
SHA51204bb26a7e1f3070d240d13d4e7dae8c4fa287aae8bb897708b0e018c0d38a843caad5f9fd4faa58ca711c40c859c35f7e14541f20205f42350d27806df2abdb4