Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 13:55
Static task
static1
Behavioral task
behavioral1
Sample
signed.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
signed.exe
Resource
win10v2004-20230703-en
General
-
Target
signed.exe
-
Size
1.8MB
-
MD5
ec8952a8dcbbfaa1fb6fda23df851402
-
SHA1
4fb7a97221090f3a4ff5263103623da165624881
-
SHA256
f022037056b50b4baf5db8ba0a437494662dc93cee9421ed12471e14a58a0d50
-
SHA512
33ce0a6ae2929145d75aceee5ab7ca6256c8a630ecb04f8df4addab02541b74c6a350a210cd5426466bf254699b76d8b77259b9bf969a131ca292d9d372d7ffd
-
SSDEEP
49152:N4o1Bkql93ztp3vKhV2E8rf/L0ZNo2gV6UlAo7TWJ:N4o1Bb73ztVv5Ei0ZTUX7Y
Malware Config
Extracted
laplas
http://clipper.guru
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Extracted
laplas
http://clipper.guru
-
api_key
0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4672 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" signed.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 24 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4672 4460 signed.exe 84 PID 4460 wrote to memory of 4672 4460 signed.exe 84 PID 4460 wrote to memory of 4672 4460 signed.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\signed.exe"C:\Users\Admin\AppData\Local\Temp\signed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:4672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725.8MB
MD5373bf1386d41106b923b40cfaeee391c
SHA1d453be281da948a635d7756fe159df15ad7aab6d
SHA256a5cf26405cde1d3c297713a4a32a03f20b173de03c5f9adb9b1483e3d447c19b
SHA512d3bb10ca5fb809e831634ade05ac3bf1adf69bff669158ab9fd1f5996834d5b00c85951c52bd6719a620f683941a6575ecf99401132c58b3244e9d35a3552eae
-
Filesize
725.8MB
MD5373bf1386d41106b923b40cfaeee391c
SHA1d453be281da948a635d7756fe159df15ad7aab6d
SHA256a5cf26405cde1d3c297713a4a32a03f20b173de03c5f9adb9b1483e3d447c19b
SHA512d3bb10ca5fb809e831634ade05ac3bf1adf69bff669158ab9fd1f5996834d5b00c85951c52bd6719a620f683941a6575ecf99401132c58b3244e9d35a3552eae