Analysis
-
max time kernel
31s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-06-2023 14:01
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1192 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1324 tmp.exe 1324 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" tmp.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1192 1324 tmp.exe 28 PID 1324 wrote to memory of 1192 1324 tmp.exe 28 PID 1324 wrote to memory of 1192 1324 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
655.5MB
MD5c085c1d0458b18f299348b3a4f2e561f
SHA1cdac86817e7d095f95d43f51dfb7e774f5a52bac
SHA2563a8885e269b8971ab37e3ceaaca1fb183ca8317e92d2b061418da67dbbde831b
SHA5129c1e6c139e5d7d1fa59ca9df78830d2b560967e03f8f971ea3cb2dcd3b54e16903b2af0fe72e26b4eb92db8653c1366c983066c5ae3eaa737be66db3b2e79b3d
-
Filesize
654.1MB
MD5c9a3d0036de36ec470474bdb2a39dddc
SHA17a99c2e723c434816c32b40f7d27c62732497ca6
SHA2566297597783108982632490f0f89d855e8d8f3f1867bd98bb714466d8841cdc5c
SHA5126a670f29ea7116379bc22a0239d95e4785a246c9592e4e6afaf059e5557d0c6f12ff117eb02aa8279fab17a7a561d01ade829ea1ba3fda4652ad603abb676d08
-
Filesize
651.3MB
MD5766ebbe475af8463fd71eaef3943c504
SHA10470fb09a020f26a1d0f867827be890948f9d775
SHA2560ce5f62f7d1ba5f0f7776d7e4aaa80ad5b2022b1ea2e4f84631df875c5958be2
SHA51251d720ee8e6a6d88a2b5fec98bfdb5f3f713e7d19d2af18f40f09d4b668a9dbbe328f864533900842356068f0a0ee76ea8c3cef8617a258a2b911caa9aad466b