Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08-07-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
3405a14bdc05e4bca019b1b36.exe
Resource
win7-20230703-en
General
-
Target
3405a14bdc05e4bca019b1b36.exe
-
Size
4.1MB
-
MD5
71f04aa7d5c3232c7c2b9afad6777b53
-
SHA1
617487d25e1b3c27112c918e54deb744c57e9fa9
-
SHA256
3405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
-
SHA512
1068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
SSDEEP
98304:CmICyUcKzmy4XlAD2R3e22RMHRPnZNCVb25cfFKG88ZvvRqgx:Cm/nzslADie22mHdZNh5078Cvv
Malware Config
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3405a14bdc05e4bca019b1b36.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3405a14bdc05e4bca019b1b36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3405a14bdc05e4bca019b1b36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 1 IoCs
pid Process 1524 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 3405a14bdc05e4bca019b1b36.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 3405a14bdc05e4bca019b1b36.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3405a14bdc05e4bca019b1b36.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2312 3405a14bdc05e4bca019b1b36.exe 1524 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1524 2312 3405a14bdc05e4bca019b1b36.exe 28 PID 2312 wrote to memory of 1524 2312 3405a14bdc05e4bca019b1b36.exe 28 PID 2312 wrote to memory of 1524 2312 3405a14bdc05e4bca019b1b36.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3405a14bdc05e4bca019b1b36.exe"C:\Users\Admin\AppData\Local\Temp\3405a14bdc05e4bca019b1b36.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
818.8MB
MD5a5aaf5eb16bd4360fd52bbb73e01d0f0
SHA138a1c45f59c6698d97bbc0910e44d98bbdb0188b
SHA2564fc4f430b89cdb09bd965f184bce3243e1b2280f26c01d424de7ce7f9e0c9ce2
SHA512dbe1c01aca96fb7cfec67b0adc28618af40d7e936dfa01104586895fb241d043ed381a165037148ed83aecd9d7159e98ee6c4b9fdcbd58fcdc544896172485b9
-
Filesize
807.4MB
MD5293d229da3c093003cad00607d835788
SHA13745f563022d7f53743aa425f0dd6cbb76f04ecb
SHA256a772e551e47013dcfd805b4fd314558a76c1af83d7dec7f402e1273e150d1a5f
SHA512328d7f61f41c7b5a66488c1e0a5254e579ce2c7c4d79274146dce0610deffe65958c3e53117ab83dae8778e4c11dfd9beb263d17e3fc406bb874beba9bac15f8