Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe
Resource
win10v2004-20240221-en
General
-
Target
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe
-
Size
7.4MB
-
MD5
156590a4560236d1fe20019c6babbc49
-
SHA1
d9f5033f58f0fef0e8165b08c7a41f7b4b10a9fd
-
SHA256
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56
-
SHA512
9f4be44f2b4b3318fe48895c0221385d5cefd0303da5da51e6788cfc0eaecd7a3c3e5db4183e829114d68d3c89ce86d630096fa91318376f105d935f8e355cc0
-
SSDEEP
196608:dZkKDdWzNLqrZQRcFE7qQGshXJbs0+XHeOeKpd:8WdoN2K97msvQD
Malware Config
Extracted
laplas
http://185.223.93.223
-
api_key
afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 2608 ntlhost.exe 2608 ntlhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 2608 ntlhost.exe 2608 ntlhost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2840 mspaint.exe 2352 mspaint.exe 664 mspaint.exe 2840 mspaint.exe 2352 mspaint.exe 2352 mspaint.exe 2352 mspaint.exe 2840 mspaint.exe 2840 mspaint.exe 664 mspaint.exe 664 mspaint.exe 664 mspaint.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2608 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 28 PID 2788 wrote to memory of 2608 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 28 PID 2788 wrote to memory of 2608 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 28 PID 2788 wrote to memory of 2608 2788 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe"C:\Users\Admin\AppData\Local\Temp\1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\DisconnectRestore.wmf"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2840
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\DisconnectRestore.wmf"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2352
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\DisconnectRestore.wmf"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5a7c030bb43ff023ef60a6660584909a7
SHA1566b919c1026ec347748f2ecd2af3c461161a53d
SHA256ace5cef539028c2a7e790132365be1be469441d0774779f3ce6dacc005d1cbd1
SHA512284a9bcd92d62e6567c0a71005d6e6d0251eecb3b44039e544a5d2965c226b2d20fbc941253ac8f74c68c842bc37db626ed230e9cc3edd07d8535a53fc2990e8
-
Filesize
3.4MB
MD58d460678b3e54f3ac6400d40d6fbb77a
SHA1cc59581ab72dc1250ecf4be0ae444eac59ee05be
SHA256953e3b2326585271fd4de6866ee5d943b6356333ab7ea997fca678db2da67630
SHA512810ad1a6034e6c7c0e9124a619bd670594d671d95102704f0e81dc8f03a8e04da50544cf49a3867aadd5ab9faed1ce4cc46209eccdfdf09c8c35abb86d9b0823