Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2023 08:23

General

  • Target

    e88c37f1bb15fcbe857ee8c4d526153f.exe

  • Size

    1.9MB

  • MD5

    e88c37f1bb15fcbe857ee8c4d526153f

  • SHA1

    c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b

  • SHA256

    9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f

  • SHA512

    8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164

  • SSDEEP

    49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe

Malware Config

Extracted

Family

redline

Botnet

RED

C2

79.137.202.0:81

Attributes
  • auth_value

    49e32ec54afd3f75dadad05dbf2e524f

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe
    "C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4152
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 284
        3⤵
        • Program crash
        PID:4688
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:4468
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 156
          3⤵
          • Program crash
          PID:3520
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
          "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
          3⤵
          • Executes dropped EXE
          PID:2468
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4152 -ip 4152
      1⤵
        PID:3140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4772 -ip 4772
        1⤵
          PID:3868

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

          Filesize

          1.3MB

          MD5

          3681076e0468f402f6a12e9d586c24b1

          SHA1

          92d9039e76ad9166b00d38100994f86ad712818d

          SHA256

          e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

          SHA512

          5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

          Filesize

          1.3MB

          MD5

          3681076e0468f402f6a12e9d586c24b1

          SHA1

          92d9039e76ad9166b00d38100994f86ad712818d

          SHA256

          e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

          SHA512

          5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

          Filesize

          1.3MB

          MD5

          3681076e0468f402f6a12e9d586c24b1

          SHA1

          92d9039e76ad9166b00d38100994f86ad712818d

          SHA256

          e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

          SHA512

          5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

          Filesize

          1.1MB

          MD5

          a76d136239408f63bf5b2af3d4dffc0e

          SHA1

          7434e0882f2825ba265f69db57e1117a4375636a

          SHA256

          c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

          SHA512

          189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

          Filesize

          1.1MB

          MD5

          a76d136239408f63bf5b2af3d4dffc0e

          SHA1

          7434e0882f2825ba265f69db57e1117a4375636a

          SHA256

          c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

          SHA512

          189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

          Filesize

          1.1MB

          MD5

          a76d136239408f63bf5b2af3d4dffc0e

          SHA1

          7434e0882f2825ba265f69db57e1117a4375636a

          SHA256

          c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

          SHA512

          189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

          Filesize

          3.6MB

          MD5

          9acf9c7921ee24285901751af52097b0

          SHA1

          0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

          SHA256

          98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

          SHA512

          7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

          Filesize

          3.6MB

          MD5

          9acf9c7921ee24285901751af52097b0

          SHA1

          0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

          SHA256

          98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

          SHA512

          7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

          Filesize

          3.6MB

          MD5

          9acf9c7921ee24285901751af52097b0

          SHA1

          0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

          SHA256

          98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

          SHA512

          7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

          Filesize

          503.0MB

          MD5

          cdbfe2b213d49641311f8d26d8301acf

          SHA1

          052600ff5aec27a9720a63e8c51ebad2442ad245

          SHA256

          c439eb2a54d261df0ac6fab6c5e03de421c4d8adc51399dc0f1883ade4668560

          SHA512

          fc789205a1addd6d2af247d2a08d11f34ae221a4fe94767fe27e8dbb798993c7a89a6f000af20a116fcf6936d7f71493c6e2a4ca20ea99a3ca3204934e23afef

        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

          Filesize

          482.2MB

          MD5

          0bebec62cfb19d21b6e76b1a59d94823

          SHA1

          9b2108575ca248ea5fe3f7e0c530fa41b96a03c9

          SHA256

          90ad1addae629f5254ad945ae174f857ce59dbb0f461eee64cc75e2ffacfe7d1

          SHA512

          66998911367c89a9dd49a4fbe5b90593eb75484bb6d065ffe10e741728b4055591ed06b6ff53bb5235095a2fe8bacc5ca357a8b382a7ebbf8bd05f056f80067b

        • memory/4468-186-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4468-163-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4468-182-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4468-183-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4468-184-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4820-156-0x0000000005930000-0x0000000005A3A000-memory.dmp

          Filesize

          1.0MB

        • memory/4820-162-0x0000000005810000-0x0000000005820000-memory.dmp

          Filesize

          64KB

        • memory/4820-161-0x0000000005860000-0x000000000589C000-memory.dmp

          Filesize

          240KB

        • memory/4820-159-0x00000000057E0000-0x00000000057F2000-memory.dmp

          Filesize

          72KB

        • memory/4820-261-0x0000000005B60000-0x0000000005BD6000-memory.dmp

          Filesize

          472KB

        • memory/4820-263-0x0000000005C80000-0x0000000005D12000-memory.dmp

          Filesize

          584KB

        • memory/4820-351-0x0000000007200000-0x00000000077A4000-memory.dmp

          Filesize

          5.6MB

        • memory/4820-359-0x0000000006CC0000-0x0000000006D26000-memory.dmp

          Filesize

          408KB

        • memory/4820-383-0x0000000005810000-0x0000000005820000-memory.dmp

          Filesize

          64KB

        • memory/4820-390-0x0000000006F20000-0x0000000006F70000-memory.dmp

          Filesize

          320KB

        • memory/4820-408-0x0000000007BA0000-0x0000000007D62000-memory.dmp

          Filesize

          1.8MB

        • memory/4820-412-0x00000000082A0000-0x00000000087CC000-memory.dmp

          Filesize

          5.2MB

        • memory/4820-153-0x0000000005E40000-0x0000000006458000-memory.dmp

          Filesize

          6.1MB

        • memory/4820-146-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB