Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
01-07-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
77exe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
77exe.exe
Resource
win10v2004-20230621-en
General
-
Target
77exe.exe
-
Size
1.9MB
-
MD5
b109489b8bb8ca8d3c5381dd2969ddaf
-
SHA1
d9579ddc7520d109cb04eb79e47effafb842134a
-
SHA256
379b9ee5c7de68fe8174c3f6668b2629ef40df26dfbb472deee14dbb79cc8fa9
-
SHA512
f967b83e22831b814f8ac92c5438af1c47b34321feda3b779ab65e70d8e8192ece86e4482d870b6fb37734fa689f10652ff57ab71388988f71a15290772557ac
-
SSDEEP
49152:fcntI+Q5GuoQZyk0FXjlCt7JDjWPmMCr0fjYmzEm8SOD:0nT3TFAttXZMCr5muD
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://45.159.189.105
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 77exe.exe 1976 77exe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 77exe.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1984 1976 77exe.exe 28 PID 1976 wrote to memory of 1984 1976 77exe.exe 28 PID 1976 wrote to memory of 1984 1976 77exe.exe 28 PID 1976 wrote to memory of 1984 1976 77exe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77exe.exe"C:\Users\Admin\AppData\Local\Temp\77exe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
513.7MB
MD552bbcf63b9f7682a59cbd342916819b8
SHA140684ca55a12d5cfdadf015b806ad4e2f0b90c7a
SHA2564b39fd780020e5081742ffdda8946c7bbda8865a32a2f5accf2bb6d85ace6a12
SHA5126eca609c29a10c1b972b971d822cd82f3bb81e1bd51264553b23f1e32cc19bfa3c2798510e095914fc0aa71c3a1126f551957460c22ca407feecc540ed5df8db
-
Filesize
534.4MB
MD5e0afb3444e4916cd08acf1a7ed4d56c5
SHA1cf94891da14ac64c824560ec6a3905d9f90392e7
SHA256f05f2f740e8c75e224d784e697848c314b3a263559c4d458aa1f5b4661076063
SHA512b9f124ef6b54ad689508944122327990e8fcabbbb7c77650a4c59ff5bceef9b22eb6811875c8ae67f190e444691fa232c01b91933aac3f4a9e985ad1a0b44a7d
-
Filesize
343.4MB
MD5c249fb2ec6802916b399538cbd3fb43e
SHA10352a983dbe8787eafbd054d75317f27e847949c
SHA256a569de78937dce6bc82899f83a00656a5e9e6c068f99fdd38de754591611aa43
SHA512bde2a179f9182442ade85abe92102a768609e7bed5ac6d2d6adeef0ace60644588c2dd1bb34ef0eee640525f72e38c8705f35dac639b2025b28edd15c8067a37
-
Filesize
547.2MB
MD5919ad6e392c94aeb4e53f7e15ac5fc8b
SHA15910d161903edd888701b565c36506ac4534d347
SHA25616b7aaa9c5e5c3e3c454993d11c33d95a02eb7ad3549711b2589a090fdaac63d
SHA512a5e422631c4a3ab44b633eeed9a594e2c105e878be6476a5d7e7f1d78a83327556bcf2aafa3ac0d61dc9f67930edf8ae8cec9c856a9048df9e3942c0ed3781d1