Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 15:56
Static task
static1
Behavioral task
behavioral1
Sample
a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe
-
Size
1.9MB
-
MD5
43a466ea26d18d125bf8af925bb617b7
-
SHA1
a05f3fa8d1b9c7bc183948a516025503a9dda569
-
SHA256
a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2
-
SHA512
d8c86539b9a115794884f3c6d6fe00beb2e75b0510b85777fc342c691986011864c04c21e0724af5874baa695168fa1e43281e782aeb06348bd572be7b4cf551
-
SSDEEP
49152:vdndufbt9ODXz12CkNram8AciuXRyjy0EjIdfCN:vdnd6av1iam8Ac4GbU6N
Malware Config
Extracted
laplas
http://clipper.guru
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://clipper.guru
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5088 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3796 4140 WerFault.exe 80 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 39 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4140 wrote to memory of 5088 4140 a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe 88 PID 4140 wrote to memory of 5088 4140 a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe 88 PID 4140 wrote to memory of 5088 4140 a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\a3f665043305d67f64f7386a8bcd89dc5ce86a76a6b5042827af58cd8b4e10f2exe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 5202⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4140 -ip 41401⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712.9MB
MD58a79254defe8a0d64f34ccd3d5640160
SHA172922c9b49932959aa7734c13542aa3629897fd0
SHA25613fac6f5a38102b6a4e00c5165ec31c51addfcf2b7870f2b98baf21bb377032e
SHA51202b7e3a683db5198846c9453b6ee533a8425fd5442c3b7296b132284184f005c31f65849eb946fd3aece324cf8b491c290fc0b933b2bb024066b454cee81b674
-
Filesize
712.9MB
MD58a79254defe8a0d64f34ccd3d5640160
SHA172922c9b49932959aa7734c13542aa3629897fd0
SHA25613fac6f5a38102b6a4e00c5165ec31c51addfcf2b7870f2b98baf21bb377032e
SHA51202b7e3a683db5198846c9453b6ee533a8425fd5442c3b7296b132284184f005c31f65849eb946fd3aece324cf8b491c290fc0b933b2bb024066b454cee81b674