Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08/08/2023, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
ee194a0b6f6c6c28740a697a5466c44f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ee194a0b6f6c6c28740a697a5466c44f.exe
Resource
win10v2004-20230703-en
General
-
Target
ee194a0b6f6c6c28740a697a5466c44f.exe
-
Size
4.0MB
-
MD5
ee194a0b6f6c6c28740a697a5466c44f
-
SHA1
6408895a89575bc618094c785ec3e5720ce455a0
-
SHA256
d30e2337e87b5bad478d20dea2fa51d38a4a9506542bdaaea7640dcc68a4432c
-
SHA512
b930974fa1af1f3fb4cbb31161501e135a612a705555dadc16374fe21d193952dc4837f7ab75fcca05c65daad18afe9a1ae724bd2a1862add27693db476ddaad
-
SSDEEP
98304:ql0TOAthBZtr+BHIvMZPEmZpHvYXMheVNyDqiGdS3q1/3:WAtrbrwtZpHg8e6Cf3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2884 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 1180 ee194a0b6f6c6c28740a697a5466c44f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" ee194a0b6f6c6c28740a697a5466c44f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1180 ee194a0b6f6c6c28740a697a5466c44f.exe 2884 ntlhost.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 4 Go-http-client/1.1 HTTP User-Agent header 2 Go-http-client/1.1 HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2884 1180 ee194a0b6f6c6c28740a697a5466c44f.exe 28 PID 1180 wrote to memory of 2884 1180 ee194a0b6f6c6c28740a697a5466c44f.exe 28 PID 1180 wrote to memory of 2884 1180 ee194a0b6f6c6c28740a697a5466c44f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee194a0b6f6c6c28740a697a5466c44f.exe"C:\Users\Admin\AppData\Local\Temp\ee194a0b6f6c6c28740a697a5466c44f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
734.0MB
MD5cd8f6723d0e215d409ccb0cb588697e9
SHA17a2f09d6b366be46eb62ee2e5b24a2ad587e626d
SHA256f71df5993d48fd274c3543e818501d9e7d0f7456d2982ce632617c6f49114d8c
SHA51254ff983f029a2bfe7764cf392ef76a81ffaf665d1cb80f69a8ebbc872d717c84dcd0c6a70256f05ab93ba479fbc908fb355c6caf598c474c6e8a550636aefbd0
-
Filesize
734.0MB
MD5cd8f6723d0e215d409ccb0cb588697e9
SHA17a2f09d6b366be46eb62ee2e5b24a2ad587e626d
SHA256f71df5993d48fd274c3543e818501d9e7d0f7456d2982ce632617c6f49114d8c
SHA51254ff983f029a2bfe7764cf392ef76a81ffaf665d1cb80f69a8ebbc872d717c84dcd0c6a70256f05ab93ba479fbc908fb355c6caf598c474c6e8a550636aefbd0