Analysis

  • max time kernel
    155s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 18:57

General

  • Target

    e88c37f1bb15fcbe857ee8c4d526153f.exe

  • Size

    1.9MB

  • MD5

    e88c37f1bb15fcbe857ee8c4d526153f

  • SHA1

    c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b

  • SHA256

    9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f

  • SHA512

    8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164

  • SSDEEP

    49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe

Malware Config

Extracted

Family

redline

Botnet

RED

C2

79.137.202.0:81

Attributes
  • auth_value

    49e32ec54afd3f75dadad05dbf2e524f

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe
    "C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 280
        3⤵
        • Program crash
        PID:3916
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:4172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 136
          3⤵
          • Program crash
          PID:868
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1180
        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
          "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
          3⤵
          • Executes dropped EXE
          PID:948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1556 -ip 1556
      1⤵
        PID:4064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4092 -ip 4092
        1⤵
          PID:4764

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

          Filesize

          1.3MB

          MD5

          3681076e0468f402f6a12e9d586c24b1

          SHA1

          92d9039e76ad9166b00d38100994f86ad712818d

          SHA256

          e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

          SHA512

          5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

          Filesize

          1.3MB

          MD5

          3681076e0468f402f6a12e9d586c24b1

          SHA1

          92d9039e76ad9166b00d38100994f86ad712818d

          SHA256

          e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

          SHA512

          5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

          Filesize

          1.3MB

          MD5

          3681076e0468f402f6a12e9d586c24b1

          SHA1

          92d9039e76ad9166b00d38100994f86ad712818d

          SHA256

          e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

          SHA512

          5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

          Filesize

          1.1MB

          MD5

          a76d136239408f63bf5b2af3d4dffc0e

          SHA1

          7434e0882f2825ba265f69db57e1117a4375636a

          SHA256

          c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

          SHA512

          189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

          Filesize

          1.1MB

          MD5

          a76d136239408f63bf5b2af3d4dffc0e

          SHA1

          7434e0882f2825ba265f69db57e1117a4375636a

          SHA256

          c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

          SHA512

          189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

          Filesize

          1.1MB

          MD5

          a76d136239408f63bf5b2af3d4dffc0e

          SHA1

          7434e0882f2825ba265f69db57e1117a4375636a

          SHA256

          c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

          SHA512

          189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

          Filesize

          3.6MB

          MD5

          9acf9c7921ee24285901751af52097b0

          SHA1

          0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

          SHA256

          98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

          SHA512

          7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

          Filesize

          3.6MB

          MD5

          9acf9c7921ee24285901751af52097b0

          SHA1

          0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

          SHA256

          98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

          SHA512

          7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

          Filesize

          3.6MB

          MD5

          9acf9c7921ee24285901751af52097b0

          SHA1

          0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

          SHA256

          98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

          SHA512

          7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

          Filesize

          275.2MB

          MD5

          9dd4b84a69484eeec42d45534a327452

          SHA1

          98d37cfe7d352d5bc29341ab49d3ecdf9b8810aa

          SHA256

          2fe17c7c88df610a29f83100ed45d164a4f3c1fea3de0e5c301b60016b72a3d0

          SHA512

          0b28c7de9ed5c74e146d59093bd824e15eb98fe898f5920ed3a48d5522aeba223ac503dbac1e94890d0d311cecd77f663322ebe84e79779c53ba113c3ac3acae

        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

          Filesize

          363.6MB

          MD5

          b9c17a161956e0b6ef4d99b413901281

          SHA1

          4502e2523bd3a01321ac895aa291fb3d7bfc60d4

          SHA256

          efcedf5659cdc21230538d9c9ef49e12494e414817f61532295389b27192e327

          SHA512

          9caaa0a16410881f0fa3e86eaafed9b7b8749a023b3cf3a5ea2429d02726ad9e642c478c5f86048a2294a50e0a28eb4e9e469163f65ca53933ac9f9d4f9c1eb7

        • memory/216-466-0x0000000004B50000-0x0000000004B60000-memory.dmp

          Filesize

          64KB

        • memory/216-651-0x00000000065B0000-0x0000000006B54000-memory.dmp

          Filesize

          5.6MB

        • memory/216-146-0x0000000000410000-0x000000000043E000-memory.dmp

          Filesize

          184KB

        • memory/216-157-0x0000000005180000-0x0000000005798000-memory.dmp

          Filesize

          6.1MB

        • memory/216-818-0x00000000075E0000-0x0000000007B0C000-memory.dmp

          Filesize

          5.2MB

        • memory/216-814-0x0000000006EE0000-0x00000000070A2000-memory.dmp

          Filesize

          1.8MB

        • memory/216-162-0x0000000004B60000-0x0000000004B9C000-memory.dmp

          Filesize

          240KB

        • memory/216-161-0x0000000004B50000-0x0000000004B60000-memory.dmp

          Filesize

          64KB

        • memory/216-160-0x0000000002570000-0x0000000002582000-memory.dmp

          Filesize

          72KB

        • memory/216-465-0x0000000004D80000-0x0000000004DF6000-memory.dmp

          Filesize

          472KB

        • memory/216-159-0x0000000004C70000-0x0000000004D7A000-memory.dmp

          Filesize

          1.0MB

        • memory/216-469-0x0000000004E00000-0x0000000004E92000-memory.dmp

          Filesize

          584KB

        • memory/216-648-0x0000000005E90000-0x0000000005EF6000-memory.dmp

          Filesize

          408KB

        • memory/216-698-0x0000000008600000-0x0000000008650000-memory.dmp

          Filesize

          320KB

        • memory/4172-163-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4172-184-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4172-186-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4172-183-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4172-182-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB