Analysis

  • max time kernel
    101s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2023 09:19

General

  • Target

    file.exe

  • Size

    1.1MB

  • MD5

    39e1f49a6042aceff8fed09cb3085005

  • SHA1

    d1ec91d7f709776514ce122f43ed78576dd76c79

  • SHA256

    91c807a3b304b61e268d884f3310e7b4c0cd74400c95c48ff7bc6ab6150282ee

  • SHA512

    13093115cb8a9ba27d7fab5d2635884da595521a1a9f4fd32c3d395de7ff2fff82c3b275f9486f0a6cc909a7e1ad01a44cd5eb266b3f1f3e8c9f93cd02d31dc1

  • SSDEEP

    12288:LR5lMAN4B9tdhJ3mfCqgdDOImbiaobw5:Lni7J+gdD8bmbs

Malware Config

Extracted

Family

redline

Botnet

1

C2

95.216.249.153:81

Attributes
  • auth_value

    a290efd4796d37556cc5af7e83c91346

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe
        "C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe"
        3⤵
        • Executes dropped EXE
        PID:572
      • C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe
        "C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:1552
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 36
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:1752
        • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe
          "C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            4⤵
            • Executes dropped EXE
            PID:2240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 36
        2⤵
        • Program crash
        PID:996

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5779993ebce0d5d09121449b30f11f9b

      SHA1

      2a982dc93b369dc9a44a241d66cfb40c3376bd34

      SHA256

      5e02cba08e8eeb476b3b08ef961981b20a34d03150871a803474ff0961e13712

      SHA512

      382ae6d990a1e716bb241ee715a839ab12e286df46ceac738904fd58008675f62a7b09df6a35853ac02602039da381e9b341cb0f3e4776a89acc12e7e4c30d0d

    • C:\Users\Admin\AppData\Local\Temp\Cab6E8E.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • C:\Users\Admin\AppData\Local\Temp\Tar701B.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      72046d312a90409c7a554eba07e1f3e8

      SHA1

      f0a43b88f42f0d1c34bd5bf29b83a3f24f94649a

      SHA256

      0010b7ec1d9f4bea9f2ca750de9467dc81b75cbb2b4c82f4843e863615409f1e

      SHA512

      59268669d37f656b3229d611e5f1c9828450cf4bc1d00d2957938bde7a1c1cfdfbb06dd593517dddf902498c4aa34176b046e0c8a6b08b5e91201265bf0ea5ba

    • C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      72046d312a90409c7a554eba07e1f3e8

      SHA1

      f0a43b88f42f0d1c34bd5bf29b83a3f24f94649a

      SHA256

      0010b7ec1d9f4bea9f2ca750de9467dc81b75cbb2b4c82f4843e863615409f1e

      SHA512

      59268669d37f656b3229d611e5f1c9828450cf4bc1d00d2957938bde7a1c1cfdfbb06dd593517dddf902498c4aa34176b046e0c8a6b08b5e91201265bf0ea5ba

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      257.3MB

      MD5

      ea42fc6f307465346fb6605901ee9d32

      SHA1

      887c6348bd5f9648470c8bedda8c885f8dacbff3

      SHA256

      766d246d68d76b98c8644ad6a12f0687b1250206409cdc5913bf96e1f701f44f

      SHA512

      5c6c3347b8c47be3f79b9ed31433e3ffdea75b69665d075303d15b3c6280ac1a1c103d0a65011b9193f294fc7e2c0c20260cdd8b6bf29b30a8d253671bd87608

    • \Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • \Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • \Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • \Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      72046d312a90409c7a554eba07e1f3e8

      SHA1

      f0a43b88f42f0d1c34bd5bf29b83a3f24f94649a

      SHA256

      0010b7ec1d9f4bea9f2ca750de9467dc81b75cbb2b4c82f4843e863615409f1e

      SHA512

      59268669d37f656b3229d611e5f1c9828450cf4bc1d00d2957938bde7a1c1cfdfbb06dd593517dddf902498c4aa34176b046e0c8a6b08b5e91201265bf0ea5ba

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      72046d312a90409c7a554eba07e1f3e8

      SHA1

      f0a43b88f42f0d1c34bd5bf29b83a3f24f94649a

      SHA256

      0010b7ec1d9f4bea9f2ca750de9467dc81b75cbb2b4c82f4843e863615409f1e

      SHA512

      59268669d37f656b3229d611e5f1c9828450cf4bc1d00d2957938bde7a1c1cfdfbb06dd593517dddf902498c4aa34176b046e0c8a6b08b5e91201265bf0ea5ba

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      72046d312a90409c7a554eba07e1f3e8

      SHA1

      f0a43b88f42f0d1c34bd5bf29b83a3f24f94649a

      SHA256

      0010b7ec1d9f4bea9f2ca750de9467dc81b75cbb2b4c82f4843e863615409f1e

      SHA512

      59268669d37f656b3229d611e5f1c9828450cf4bc1d00d2957938bde7a1c1cfdfbb06dd593517dddf902498c4aa34176b046e0c8a6b08b5e91201265bf0ea5ba

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      72046d312a90409c7a554eba07e1f3e8

      SHA1

      f0a43b88f42f0d1c34bd5bf29b83a3f24f94649a

      SHA256

      0010b7ec1d9f4bea9f2ca750de9467dc81b75cbb2b4c82f4843e863615409f1e

      SHA512

      59268669d37f656b3229d611e5f1c9828450cf4bc1d00d2957938bde7a1c1cfdfbb06dd593517dddf902498c4aa34176b046e0c8a6b08b5e91201265bf0ea5ba

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      72046d312a90409c7a554eba07e1f3e8

      SHA1

      f0a43b88f42f0d1c34bd5bf29b83a3f24f94649a

      SHA256

      0010b7ec1d9f4bea9f2ca750de9467dc81b75cbb2b4c82f4843e863615409f1e

      SHA512

      59268669d37f656b3229d611e5f1c9828450cf4bc1d00d2957938bde7a1c1cfdfbb06dd593517dddf902498c4aa34176b046e0c8a6b08b5e91201265bf0ea5ba

    • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      258.1MB

      MD5

      8abdcf737a957da5053c004a5c4a51d6

      SHA1

      95c5b3ede916b56404593070bb9cbb7b5b1b8403

      SHA256

      75025d3e69705d407af4d450e74b49288714d926ac1236c557ec550350441737

      SHA512

      fdd5cf0f0d1515b6fff48fe86aa8ac6a31ace4e46adfcc5578cd371e2f58c70d2e9c231a0aa7a1dcc8c11f8a4c3dadbc40b536a6a1e8955f91d83a162b7bb1e1

    • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      249.5MB

      MD5

      e9e75c24505d2b1efdc58dd70c6ddcbb

      SHA1

      cfd89e349f5955624ca37ab7990bef1fed5b3b57

      SHA256

      04204ff0aae06ae82298fd53817338ed185096b2c0754e6a368b6176eeadcd80

      SHA512

      30cf785e6e4f8c3708350f09526b696569c7a2f34285855a71b23fc77c5a5614938480a5b198d17986b4650943c987ffdde6c2c03578a8f24eca9e9df058cdf6

    • memory/572-144-0x0000000000020000-0x0000000000026000-memory.dmp

      Filesize

      24KB

    • memory/572-143-0x0000000000020000-0x0000000000026000-memory.dmp

      Filesize

      24KB

    • memory/572-142-0x0000000000020000-0x0000000000026000-memory.dmp

      Filesize

      24KB

    • memory/840-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/840-61-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/840-64-0x0000000000C90000-0x0000000000CD0000-memory.dmp

      Filesize

      256KB

    • memory/840-63-0x0000000000310000-0x0000000000316000-memory.dmp

      Filesize

      24KB

    • memory/840-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/840-62-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/840-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/840-65-0x0000000000C90000-0x0000000000CD0000-memory.dmp

      Filesize

      256KB

    • memory/1552-177-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1552-181-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1552-155-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1552-154-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1552-179-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1552-178-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB