Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08-07-2023 09:06
Static task
static1
Behavioral task
behavioral1
Sample
3405a14bdc05e4bca019b1b36.exe
Resource
win7-20230703-en
General
-
Target
3405a14bdc05e4bca019b1b36.exe
-
Size
4.1MB
-
MD5
71f04aa7d5c3232c7c2b9afad6777b53
-
SHA1
617487d25e1b3c27112c918e54deb744c57e9fa9
-
SHA256
3405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
-
SHA512
1068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
SSDEEP
98304:CmICyUcKzmy4XlAD2R3e22RMHRPnZNCVb25cfFKG88ZvvRqgx:Cm/nzslADie22mHdZNh5078Cvv
Malware Config
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3405a14bdc05e4bca019b1b36.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3405a14bdc05e4bca019b1b36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3405a14bdc05e4bca019b1b36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 3405a14bdc05e4bca019b1b36.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 3405a14bdc05e4bca019b1b36.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3405a14bdc05e4bca019b1b36.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2308 3405a14bdc05e4bca019b1b36.exe 3068 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2308 wrote to memory of 3068 2308 3405a14bdc05e4bca019b1b36.exe 28 PID 2308 wrote to memory of 3068 2308 3405a14bdc05e4bca019b1b36.exe 28 PID 2308 wrote to memory of 3068 2308 3405a14bdc05e4bca019b1b36.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3405a14bdc05e4bca019b1b36.exe"C:\Users\Admin\AppData\Local\Temp\3405a14bdc05e4bca019b1b36.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748.1MB
MD5dd13e60a349059b57215c94f03de58d0
SHA1953a43901f318ec2021758853d3f2192ea492eab
SHA256ad3df9932ef50223dba720aa8962556540ffd9ca1c6f9a788b4250a81d4bd642
SHA512432a94c5a1ff1ca1edd043e5741db46d0133f1a7fef2616ce3d39dde7e0e98d0465c8361111859a20fdc71f80ea0ddf445026e706227613ff92fa004ea7f2f54
-
Filesize
748.1MB
MD5dd13e60a349059b57215c94f03de58d0
SHA1953a43901f318ec2021758853d3f2192ea492eab
SHA256ad3df9932ef50223dba720aa8962556540ffd9ca1c6f9a788b4250a81d4bd642
SHA512432a94c5a1ff1ca1edd043e5741db46d0133f1a7fef2616ce3d39dde7e0e98d0465c8361111859a20fdc71f80ea0ddf445026e706227613ff92fa004ea7f2f54