Analysis

  • max time kernel
    73s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2023 09:04

General

  • Target

    3f0e8a9d61be8b596b4be752965295ad.exe

  • Size

    1.1MB

  • MD5

    3f0e8a9d61be8b596b4be752965295ad

  • SHA1

    23399af014c60bcd53af9591a6bb80bc09772139

  • SHA256

    69f24003a768ac6451b4bac285475486d27c39723f474e3b8a19c61ceb732838

  • SHA512

    340137d0b76a523dc680847f656048f02545a306d5fac927fd53bfe41e07ab0fea893a821e45344e2ade31d078ec6cd1cff4a6398e09321037973df703fcd8e7

  • SSDEEP

    6144:Tuo1XQlPoSlw4524UcL/LHh5Z8Z0AOkGZKWklMdGwuss4tjS0G+zLT1YS:TXX4flh524UOyKKWklMdGOtjasBY

Malware Config

Extracted

Family

redline

Botnet

1

C2

95.216.249.153:81

Attributes
  • auth_value

    a290efd4796d37556cc5af7e83c91346

Extracted

Family

systembc

C2

5.42.95.122:4308

194.87.111.29:4308

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 14 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 3 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe
    "C:\Users\Admin\AppData\Local\Temp\3f0e8a9d61be8b596b4be752965295ad.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe
        "C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:2020
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 48
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:1064
        • C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe
          "C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
              PID:576
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 48
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:1644
          • C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe
            "C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:956
            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              4⤵
              • Executes dropped EXE
              PID:472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 48
          2⤵
          • Program crash
          PID:1280

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        62KB

        MD5

        3ac860860707baaf32469fa7cc7c0192

        SHA1

        c33c2acdaba0e6fa41fd2f00f186804722477639

        SHA256

        d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

        SHA512

        d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        3cd0a6d2d66f62398a0d87413258bca6

        SHA1

        f545dc52e21e6ee463dd9a3e3c80eaf9bed7e07e

        SHA256

        972e7df97b036be5e35bd00aae5fd233fe9a04a9a23285d24f9d568b8b1f7b90

        SHA512

        8bde5a71eacd45f846968bbc7c6f5dc4a1bc424b075adc678100220ee91e4c1faadc20799bcff162c938af88ebd819dfa8b28256d59fff46661e4a65096fd35c

      • C:\Users\Admin\AppData\Local\Temp\Cab74C5.tmp

        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe

        Filesize

        923KB

        MD5

        0c0827b80b8450ed442d0a5afbc1324c

        SHA1

        f212fc466d539f1b327e0f23269c4d2818e9bbfb

        SHA256

        96bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a

        SHA512

        75df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c

      • C:\Users\Admin\AppData\Local\Temp\LengthLong32.exe

        Filesize

        923KB

        MD5

        0c0827b80b8450ed442d0a5afbc1324c

        SHA1

        f212fc466d539f1b327e0f23269c4d2818e9bbfb

        SHA256

        96bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a

        SHA512

        75df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c

      • C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe

        Filesize

        3.8MB

        MD5

        68be007bd3fa09d26fcee584a9157770

        SHA1

        6f191c0587c8055f26367f25ce0f7787ca272714

        SHA256

        71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

        SHA512

        f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

      • C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe

        Filesize

        3.8MB

        MD5

        68be007bd3fa09d26fcee584a9157770

        SHA1

        6f191c0587c8055f26367f25ce0f7787ca272714

        SHA256

        71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

        SHA512

        f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

      • C:\Users\Admin\AppData\Local\Temp\LengthLong32x.exe

        Filesize

        3.8MB

        MD5

        68be007bd3fa09d26fcee584a9157770

        SHA1

        6f191c0587c8055f26367f25ce0f7787ca272714

        SHA256

        71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

        SHA512

        f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

      • C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe

        Filesize

        3.4MB

        MD5

        ac27f58d41c18197d3eb0242610c6dbf

        SHA1

        505ed23652ea471cf1315f6eda6bd5729b87025e

        SHA256

        8af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84

        SHA512

        1386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380

      • C:\Users\Admin\AppData\Local\Temp\LengthLong64.exe

        Filesize

        3.4MB

        MD5

        ac27f58d41c18197d3eb0242610c6dbf

        SHA1

        505ed23652ea471cf1315f6eda6bd5729b87025e

        SHA256

        8af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84

        SHA512

        1386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380

      • C:\Users\Admin\AppData\Local\Temp\Tar75E5.tmp

        Filesize

        164KB

        MD5

        4ff65ad929cd9a367680e0e5b1c08166

        SHA1

        c0af0d4396bd1f15c45f39d3b849ba444233b3a2

        SHA256

        c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

        SHA512

        f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        266.8MB

        MD5

        f004d310fbbba32770a623e0bb6051bc

        SHA1

        cce571f3cca417a35390341365b5a4236287a679

        SHA256

        7a869edccff3beb6400704a22f5d5e38450c932cee2b51a68a02234678e818e5

        SHA512

        352fa231b2e7a705d1b1803f5bd61a554a783c34014f58065cda614f27edb5dea7c045187e2bd9d9dd6cbd59f8be033a6c123072367cb4369c606a238a21657d

      • \Users\Admin\AppData\Local\Temp\LengthLong32.exe

        Filesize

        923KB

        MD5

        0c0827b80b8450ed442d0a5afbc1324c

        SHA1

        f212fc466d539f1b327e0f23269c4d2818e9bbfb

        SHA256

        96bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a

        SHA512

        75df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c

      • \Users\Admin\AppData\Local\Temp\LengthLong32.exe

        Filesize

        923KB

        MD5

        0c0827b80b8450ed442d0a5afbc1324c

        SHA1

        f212fc466d539f1b327e0f23269c4d2818e9bbfb

        SHA256

        96bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a

        SHA512

        75df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c

      • \Users\Admin\AppData\Local\Temp\LengthLong32.exe

        Filesize

        923KB

        MD5

        0c0827b80b8450ed442d0a5afbc1324c

        SHA1

        f212fc466d539f1b327e0f23269c4d2818e9bbfb

        SHA256

        96bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a

        SHA512

        75df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c

      • \Users\Admin\AppData\Local\Temp\LengthLong32.exe

        Filesize

        923KB

        MD5

        0c0827b80b8450ed442d0a5afbc1324c

        SHA1

        f212fc466d539f1b327e0f23269c4d2818e9bbfb

        SHA256

        96bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a

        SHA512

        75df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c

      • \Users\Admin\AppData\Local\Temp\LengthLong32.exe

        Filesize

        923KB

        MD5

        0c0827b80b8450ed442d0a5afbc1324c

        SHA1

        f212fc466d539f1b327e0f23269c4d2818e9bbfb

        SHA256

        96bb40eaf29d3619c016a62e397e02761e898f342ab4dfdb52232ceddc13846a

        SHA512

        75df0198b67109a5443c06e63c9ef145ae343c7519c9e2a4b7a06ddaf880c95a725ba223e2f183d52ee13f70c9a599e2b2ac2bcbc3d0510a4ef11941d7af118c

      • \Users\Admin\AppData\Local\Temp\LengthLong32x.exe

        Filesize

        3.8MB

        MD5

        68be007bd3fa09d26fcee584a9157770

        SHA1

        6f191c0587c8055f26367f25ce0f7787ca272714

        SHA256

        71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

        SHA512

        f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

      • \Users\Admin\AppData\Local\Temp\LengthLong32x.exe

        Filesize

        3.8MB

        MD5

        68be007bd3fa09d26fcee584a9157770

        SHA1

        6f191c0587c8055f26367f25ce0f7787ca272714

        SHA256

        71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

        SHA512

        f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

      • \Users\Admin\AppData\Local\Temp\LengthLong64.exe

        Filesize

        3.4MB

        MD5

        ac27f58d41c18197d3eb0242610c6dbf

        SHA1

        505ed23652ea471cf1315f6eda6bd5729b87025e

        SHA256

        8af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84

        SHA512

        1386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380

      • \Users\Admin\AppData\Local\Temp\LengthLong64.exe

        Filesize

        3.4MB

        MD5

        ac27f58d41c18197d3eb0242610c6dbf

        SHA1

        505ed23652ea471cf1315f6eda6bd5729b87025e

        SHA256

        8af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84

        SHA512

        1386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380

      • \Users\Admin\AppData\Local\Temp\LengthLong64.exe

        Filesize

        3.4MB

        MD5

        ac27f58d41c18197d3eb0242610c6dbf

        SHA1

        505ed23652ea471cf1315f6eda6bd5729b87025e

        SHA256

        8af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84

        SHA512

        1386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380

      • \Users\Admin\AppData\Local\Temp\LengthLong64.exe

        Filesize

        3.4MB

        MD5

        ac27f58d41c18197d3eb0242610c6dbf

        SHA1

        505ed23652ea471cf1315f6eda6bd5729b87025e

        SHA256

        8af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84

        SHA512

        1386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380

      • \Users\Admin\AppData\Local\Temp\LengthLong64.exe

        Filesize

        3.4MB

        MD5

        ac27f58d41c18197d3eb0242610c6dbf

        SHA1

        505ed23652ea471cf1315f6eda6bd5729b87025e

        SHA256

        8af2872503e066bcf59ef6cfe86d77a54382420e9e731f8674103b7f414c9b84

        SHA512

        1386bf095925f7d37f125bc4ec1bd89f11b75ff87d49e42a7729aabf6f75bdbb380c687530330e92545434493ac34d1cb38da78b117765a35d1f1f0a10d50380

      • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        266.5MB

        MD5

        ab3ff007b4259a71c7cc69b816893f48

        SHA1

        2cf9027dd31830410bea7bf0169e8270ccae980b

        SHA256

        89d3873be47cde771f868a17266d0611fe98f99c90dd09f8d09bb844a82857d9

        SHA512

        5e224e7eebfa067d01aea3f15467c7e84554ec04ae658b01e34e37825f75d3c8b96d3fd1776aa82651a0f871c1265ed7d597319a9c27e3d17f1ce367c251c8e6

      • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        357.4MB

        MD5

        2a3ade320da98023da0726833e96c76e

        SHA1

        fe51b4ffea3441968bf639ce54a340291f47d834

        SHA256

        18526258a8f9879e6252f8e8790f106b86bdfd04f1a01418c28728037d73385d

        SHA512

        361c279cc712400a658644e7a7f35b050f9ec55d047b9f066bbf13617a1da90955b009b0c31e4f22f3a92c2cc4f3e7103315f0d4b054226b7a10ce8c3226cf82

      • memory/576-150-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/576-160-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/576-162-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/576-151-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/2020-199-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2020-196-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2020-173-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2020-174-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2020-201-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2020-197-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2032-61-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2032-65-0x0000000004870000-0x00000000048B0000-memory.dmp

        Filesize

        256KB

      • memory/2032-64-0x0000000004870000-0x00000000048B0000-memory.dmp

        Filesize

        256KB

      • memory/2032-63-0x00000000004F0000-0x00000000004F6000-memory.dmp

        Filesize

        24KB

      • memory/2032-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2032-62-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2032-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2032-54-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB