Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
4.0MB
-
MD5
ee194a0b6f6c6c28740a697a5466c44f
-
SHA1
6408895a89575bc618094c785ec3e5720ce455a0
-
SHA256
d30e2337e87b5bad478d20dea2fa51d38a4a9506542bdaaea7640dcc68a4432c
-
SHA512
b930974fa1af1f3fb4cbb31161501e135a612a705555dadc16374fe21d193952dc4837f7ab75fcca05c65daad18afe9a1ae724bd2a1862add27693db476ddaad
-
SSDEEP
98304:ql0TOAthBZtr+BHIvMZPEmZpHvYXMheVNyDqiGdS3q1/3:WAtrbrwtZpHg8e6Cf3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 980 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" tmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3596 tmp.exe 980 ntlhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 19 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3596 wrote to memory of 980 3596 tmp.exe 81 PID 3596 wrote to memory of 980 3596 tmp.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641.1MB
MD54cd3f96ec881acfcd03ecabd6cc91a91
SHA19d09c50d97ea897f0c0f29db816225cef3357557
SHA2566d1a5d8f59c9ebae18ad599c792553d463d6380048717faa94b34d3f1f0c2821
SHA51272e197695a53a968e78da12b20b47e14cbf1a7e1a0324832e6c88d588ed8cd40e211d6ed408f8cd8117b5e2464ad302a7d647051a6699e92af0754806f1e5648
-
Filesize
644.5MB
MD59ef7ff00e0e1a60fabc0a6fbd5cf9865
SHA110605b0193e060bb2e39f492bdfd4b8450268a22
SHA2568a20b5deb2847c057082154af43ef43c8ab3cf3572d78b9d5b93aa9f38a62b59
SHA512b34fc868201c276e31ee0f0c9f04777aa68ccb053d8b925cc5d4e8ac3387dd8ec2eefdb7e82d65dbf4981c4072fbe8757b83b739fc6badeb7eb45a2eeabd07f9