Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe
Resource
win10v2004-20240221-en
General
-
Target
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe
-
Size
7.4MB
-
MD5
156590a4560236d1fe20019c6babbc49
-
SHA1
d9f5033f58f0fef0e8165b08c7a41f7b4b10a9fd
-
SHA256
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56
-
SHA512
9f4be44f2b4b3318fe48895c0221385d5cefd0303da5da51e6788cfc0eaecd7a3c3e5db4183e829114d68d3c89ce86d630096fa91318376f105d935f8e355cc0
-
SSDEEP
196608:dZkKDdWzNLqrZQRcFE7qQGshXJbs0+XHeOeKpd:8WdoN2K97msvQD
Malware Config
Extracted
laplas
http://185.223.93.223
-
api_key
afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ntlhost.exepid process 4752 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exentlhost.exepid process 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 4752 ntlhost.exe 4752 ntlhost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exentlhost.exepid process 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe 4752 ntlhost.exe 4752 ntlhost.exe 4752 ntlhost.exe 4752 ntlhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exedescription pid process target process PID 1144 wrote to memory of 4752 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe ntlhost.exe PID 1144 wrote to memory of 4752 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe ntlhost.exe PID 1144 wrote to memory of 4752 1144 1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe ntlhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe"C:\Users\Admin\AppData\Local\Temp\1d6781892cee8a3c195490c7476e20e3a16b5c0e398a519d83849ca7d11e1c56-1.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5b58e550edde6e0222e857f5e6fd9582a
SHA178a8a42353661ec802d612dcb1c427d80ed95d3f
SHA2568e6261443a24145a92b25e8b86b8c1f09187090bec084c6af6ba7acc20e7eb90
SHA5120eb53e60594f6212cb4c9469203e0bada2193cf51b8b4c96d36120d0ec71688854d23d18236ba641cc6a6b4390dfd2b6bc69faddd7ee859c6c77a33734578204
-
Filesize
622KB
MD5ffb99c37509ec723f036a4c045cee0f1
SHA154ed4c0171cefbc809987b4065a8a85f98b6ca32
SHA2569f11ad5326038c1e83ed14f4e8eef2c46499b5054743adab93ae9f207f1db82c
SHA5126fe3a53e6cf00102c5e709c82a5f56c7848ba6c2732bb98daf15d504919f3a33cd6a1f85b4f91204434a9abb62cc8d41a7b5764c79efbaba2d4f74534e9ac9a2