Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 12:04
Static task
static1
Behavioral task
behavioral1
Sample
77.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
77.exe
Resource
win10v2004-20230621-en
General
-
Target
77.exe
-
Size
1.9MB
-
MD5
b109489b8bb8ca8d3c5381dd2969ddaf
-
SHA1
d9579ddc7520d109cb04eb79e47effafb842134a
-
SHA256
379b9ee5c7de68fe8174c3f6668b2629ef40df26dfbb472deee14dbb79cc8fa9
-
SHA512
f967b83e22831b814f8ac92c5438af1c47b34321feda3b779ab65e70d8e8192ece86e4482d870b6fb37734fa689f10652ff57ab71388988f71a15290772557ac
-
SSDEEP
49152:fcntI+Q5GuoQZyk0FXjlCt7JDjWPmMCr0fjYmzEm8SOD:0nT3TFAttXZMCr5muD
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 77.exe 1724 77.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 77.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1704 1724 77.exe 28 PID 1724 wrote to memory of 1704 1724 77.exe 28 PID 1724 wrote to memory of 1704 1724 77.exe 28 PID 1724 wrote to memory of 1704 1724 77.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77.exe"C:\Users\Admin\AppData\Local\Temp\77.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
445.7MB
MD5b72f4e29be8ade9fc0b8a03d6053b20a
SHA1a8c040c25ac2ebc7d107079c4130b28e9ba0fed2
SHA256c6ace807b1c158f20c8477b87166263311f1abeb7cb3e3a1a7e750287f60c7b3
SHA51228db85fb7c05ff765fc62246f116e819985a68d5ce1f4dc7827bbd7a4737882e55da1f8b2716baf8ee9a642b5f1ea5fc51069e870e749ba0163103524802efa1
-
Filesize
429.2MB
MD517774231c9ef0042f055c2ed6fd925e8
SHA1c285ac56b30d964c01f2a922aaf38eefbcb57451
SHA25600b4a6f74eb08e2d4acf2543abc1aec3fac8734d53b9bdd10276eb96fe61d2b9
SHA5122a87677e75a91f5c50efb78fbd591632a07f7d758f8263aa5baf9c4201a58c64f822f05f160afcaf793ec9533766e600841dcde061445bef47bcd82cd8a1ddfe
-
Filesize
423.8MB
MD557c146df03f46c5e69856325cc01c1b2
SHA130b72d227019c512b3c3dcfc26f286477a6659f1
SHA2565de9afefa89415ccc61154af30bd43a92dee6d63019fba648d66d7a648dd2035
SHA5121c6c77288ee0023c8862bcd998aa63444bb41f8768fde3f88f327d91414d3eb09eb2a0391b77ff1f9463e2a05308542c26389db9552c1275b3a7ab2501c1b252
-
Filesize
445.5MB
MD5d13f0cb81439a0551151be43277dc68a
SHA1ab117b672dd458d257aa85bf3ceea19565b4d6cc
SHA256472edd242b216b6687dae536ecab8484fbab7b4f23fae0f782fa4ad8dad835a5
SHA51294a7156240965aed8aa624bad55c2880ca1759047473c6c5ec1d68f19ab74cec304d5ca2d5461a7b6f80ba0213dc448d3cdd0828aa1dfc701b9132f62b176097