Analysis
-
max time kernel
29s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-06-2023 07:49
Behavioral task
behavioral1
Sample
71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe
Resource
win10v2004-20230220-en
General
-
Target
71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe
-
Size
3.8MB
-
MD5
68be007bd3fa09d26fcee584a9157770
-
SHA1
6f191c0587c8055f26367f25ce0f7787ca272714
-
SHA256
71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
-
SHA512
f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
SSDEEP
49152:VeCseICR7NWm8qpHakXvLQh0/50OicF5pDRXxRv0VF14L:VeCrXv0W/tpDRX5L
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1236 71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe 1236 71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1692 1236 71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe 28 PID 1236 wrote to memory of 1692 1236 71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe 28 PID 1236 wrote to memory of 1692 1236 71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe 28 PID 1236 wrote to memory of 1692 1236 71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe"C:\Users\Admin\AppData\Local\Temp\71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648.2MB
MD50396b00ae41a6b9f00aaad9a21e51c6c
SHA155fff4131a2210b89174f809780999aa90b0adf3
SHA25614cdb8aa1fa5a2263d148f9b828e4a3eb094816c4962d6c0ef57dc8dea518eaa
SHA512c40f7d749dc9b1826bda25f72f716406e987cc0376ca4902e5a0ca2de614d27606c1736c1a6974ac4f4b75a1801c5863b0752b557250191b5c446498ba832cf8
-
Filesize
538.1MB
MD5a31af7bad9d54430788bd174f888278b
SHA1e7d8aa7e63ce4e3b6774a00eacbfa1fd35def803
SHA256e93c8539de6cb4e7d5a3b7dfc538ed439a9872ac355838ddf133756cdb1c730f
SHA512260f5e5d78d0edb3ba47cc46b602ad5d2303c4af179aa9f10c8e356c2a67d71712d47792f72eed49fadc37c0fd58ece7bb55dd99b00e6cc9c02519035ac2074e
-
Filesize
430.2MB
MD5bca40ac9c870291e11d123c7ab7145a4
SHA15615ce5c7773547939104b23432a8e118f8383cb
SHA256416276171152ea7f6c32b68d794975edebb52d9707854afdf1aa31e026ae5d25
SHA512fa40798c729390ca0a3e55630fe4032938a10381fc876aaa3dd7b262f274a4f0b8ac30154db9c717064f185e389627c9b4d9e198d951c8edd55936da7a3932ee
-
Filesize
668.8MB
MD525c27ecbf73f9b540d4604ff51fe9655
SHA1c4727035ebd5c7604e4f4db4f4a7ae8b9eb03803
SHA256b51e6218cec3e622164b0a22ee05cefbec183007fc32fc5c27fef8ee98d3b9c9
SHA512ec4766e5f74e3a7e98b4cfaa6e90b82ee91c66917e7bf2ac1876ab04366b3a1887dea7da1eb682bcabdab03cb12433a45492b4ac966fbb40ab21a736cb9e0d37