Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2023 07:21
Static task
static1
Behavioral task
behavioral1
Sample
b109489b8bb8ca8d3c5381dd2969ddaf.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
b109489b8bb8ca8d3c5381dd2969ddaf.exe
Resource
win10v2004-20230621-en
General
-
Target
b109489b8bb8ca8d3c5381dd2969ddaf.exe
-
Size
1.9MB
-
MD5
b109489b8bb8ca8d3c5381dd2969ddaf
-
SHA1
d9579ddc7520d109cb04eb79e47effafb842134a
-
SHA256
379b9ee5c7de68fe8174c3f6668b2629ef40df26dfbb472deee14dbb79cc8fa9
-
SHA512
f967b83e22831b814f8ac92c5438af1c47b34321feda3b779ab65e70d8e8192ece86e4482d870b6fb37734fa689f10652ff57ab71388988f71a15290772557ac
-
SSDEEP
49152:fcntI+Q5GuoQZyk0FXjlCt7JDjWPmMCr0fjYmzEm8SOD:0nT3TFAttXZMCr5muD
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4176 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" b109489b8bb8ca8d3c5381dd2969ddaf.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 31 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4176 1052 b109489b8bb8ca8d3c5381dd2969ddaf.exe 86 PID 1052 wrote to memory of 4176 1052 b109489b8bb8ca8d3c5381dd2969ddaf.exe 86 PID 1052 wrote to memory of 4176 1052 b109489b8bb8ca8d3c5381dd2969ddaf.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b109489b8bb8ca8d3c5381dd2969ddaf.exe"C:\Users\Admin\AppData\Local\Temp\b109489b8bb8ca8d3c5381dd2969ddaf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4176
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
729.9MB
MD5da4ca6d5d74e82a0f75ac54f4f2b6f25
SHA1bbbe928fb9b97659b61621261b55763952c812b6
SHA2565247bf1ffb44fed93e13feba00cccdad43f8193b33db794df8165903f0dcb5c6
SHA512846d688b59cac93677218c5feb0b1e54745b21d519a1a3163cf5a73f7e1bad4c4838c2fc846e07c2d8e28b619ac88fec85574db8b09c71b87e6b199d71a1bb48
-
Filesize
729.9MB
MD5da4ca6d5d74e82a0f75ac54f4f2b6f25
SHA1bbbe928fb9b97659b61621261b55763952c812b6
SHA2565247bf1ffb44fed93e13feba00cccdad43f8193b33db794df8165903f0dcb5c6
SHA512846d688b59cac93677218c5feb0b1e54745b21d519a1a3163cf5a73f7e1bad4c4838c2fc846e07c2d8e28b619ac88fec85574db8b09c71b87e6b199d71a1bb48