Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2023 12:39
Static task
static1
Behavioral task
behavioral1
Sample
e5cbc0114ff238740e72e907ad20223c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e5cbc0114ff238740e72e907ad20223c.exe
Resource
win10v2004-20230703-en
General
-
Target
e5cbc0114ff238740e72e907ad20223c.exe
-
Size
1.8MB
-
MD5
e5cbc0114ff238740e72e907ad20223c
-
SHA1
98c5d3c714adb3fbef71c19eaaa53cb680dd2d91
-
SHA256
bdf326424f960a66d01dd645db9fd335a157ceb86d7f482ff15205fa7d9cc7b0
-
SHA512
7049adad987de004b179198aa72910c9bc47f5f0095032cc44a9c409bc6337150b05a208e47919e276c74bbbb9bfa1bee6b58575b2176083e0210af6ce9c9b92
-
SSDEEP
49152:bm/7cijxOPr17ocI5ut5TrCEJ5GtFRpr:bm/7cijcPr9ocI5K5NjGnL
Malware Config
Extracted
laplas
http://clipper.guru
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://clipper.guru
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2960 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" e5cbc0114ff238740e72e907ad20223c.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 23 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2960 3032 e5cbc0114ff238740e72e907ad20223c.exe 85 PID 3032 wrote to memory of 2960 3032 e5cbc0114ff238740e72e907ad20223c.exe 85 PID 3032 wrote to memory of 2960 3032 e5cbc0114ff238740e72e907ad20223c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5cbc0114ff238740e72e907ad20223c.exe"C:\Users\Admin\AppData\Local\Temp\e5cbc0114ff238740e72e907ad20223c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
739.7MB
MD554b267b83292c75ac6490d481deaaadc
SHA1205e3ff5d1a5d4dbb95c89ef427fe4aff74ccebb
SHA2565e6bc07335ea7a54d9495c630c08edac8e3b9421a241b4d7c77efcdbc16b54db
SHA512384033e82d64e1ebd808e99cd7073d4a72977267b4cc4bbc76290c5f72f2cdde32e11b9474f1ea6631fcacb95e2d54d605772e34f805d51ea4bfb00b0372c799
-
Filesize
818.7MB
MD57a6dd2ce5759cfaeeed0da2d80d75375
SHA1c0f0bf47446719db54550919ccd0045dd9f1f0a0
SHA2562f0d20829e0a89e667489d05d5411964a04e129e270fcf65beb4e823d4a85aa6
SHA5124bfca40ee23a5da135ba6a2e24681af0763aaf8104d1cd07bfeb66fa8118a94057e8cb95f3ae6591eb2c2b568c28f5cdaaad44dac970fdf1d090ed5acdc9e3f3