Resubmissions

13-06-2023 07:00

230613-hs3zbafg3w 10

13-06-2023 06:39

230613-heq3lafg2t 10

13-06-2023 03:28

230613-d1sq4aee98 10

13-06-2023 03:07

230613-dmpghsfb3z 10

Analysis

  • max time kernel
    211s
  • max time network
    232s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2023 03:07

General

  • Target

    InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe

  • Size

    693.0MB

  • MD5

    fb757b3c077ec1976a8079ca0925e330

  • SHA1

    a8a3c03094572e007b867b5bb9c26acfb182c509

  • SHA256

    f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667

  • SHA512

    6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502

  • SSDEEP

    1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72

Malware Config

Extracted

Family

redline

Botnet

@hendrolas

C2

94.142.138.4:80

Attributes
  • auth_value

    71d16d25eddbb4fd3b98070432f1a757

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Detects Lobshot family 5 IoCs
  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Lobshot

    Lobshot is a backdoor module written in c++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe
    "C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe
      "C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          C:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\Users\Admin\AppData\Local\Temp\conhost.exe
            "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4280
            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              6⤵
              • Executes dropped EXE
              PID:3892
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1240
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3308
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1
                7⤵
                • Runs ping.exe
                PID:4708
              • C:\ProgramData\service.exe
                "C:\ProgramData\service.exe"
                7⤵
                • Executes dropped EXE
                PID:4584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\service.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\ProgramData\service.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe

    Filesize

    761.8MB

    MD5

    469b4eb3d9e71ace8bc01d46fe8ec6f3

    SHA1

    489aa9ab8aa9a3f20eacdd418c9c91c1326edac4

    SHA256

    0cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562

    SHA512

    207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c

  • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe

    Filesize

    761.8MB

    MD5

    469b4eb3d9e71ace8bc01d46fe8ec6f3

    SHA1

    489aa9ab8aa9a3f20eacdd418c9c91c1326edac4

    SHA256

    0cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562

    SHA512

    207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xwradopw.guv.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    80KB

    MD5

    b8d23f55d8924b617a57035db1cd3eb0

    SHA1

    94f84b29f47762afa6f44b39dea910286381f296

    SHA256

    921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

    SHA512

    656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    542.9MB

    MD5

    011f46b0ee477bb46caa31654c1a386f

    SHA1

    250b86561fc0f32fdda14ab10f7ed5990ef636e2

    SHA256

    0a8a6de5eb060a63b215d9ef7c7ba72acb1069ee7ad916a7733fffbb2a7bf57d

    SHA512

    83ba43c0cf3f2678236ca802c587e9931f1d0e202a30300b9dd67a8a05c545222dba533c6972e9c7673ca82731ce10a1e8d9342dd3a7132e4f636d854ae14345

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    541.6MB

    MD5

    088fce9345272b18eec436229040fda0

    SHA1

    9dbef53e0d54dcfcfc189df50fc6de6eb21f8663

    SHA256

    0e246deeace57992818e598555b936e8535bda28791ee788839ce68d18046a39

    SHA512

    953d0378a8a0faf2593b1ab47c5a232c5ae2bd4bd1e3a6d4b1ae28886bfae4522419fd805c8c123e3896659e431138d897c836e29c8722435f5cc11b084db59d

  • memory/1592-181-0x00000000181B0000-0x00000000181C0000-memory.dmp

    Filesize

    64KB

  • memory/1592-167-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1592-179-0x000000001E950000-0x000000001EE7C000-memory.dmp

    Filesize

    5.2MB

  • memory/1592-178-0x000000001E250000-0x000000001E412000-memory.dmp

    Filesize

    1.8MB

  • memory/1592-177-0x000000001D300000-0x000000001D350000-memory.dmp

    Filesize

    320KB

  • memory/1592-172-0x00000000191F0000-0x000000001922C000-memory.dmp

    Filesize

    240KB

  • memory/1592-171-0x0000000018EA0000-0x0000000018EB2000-memory.dmp

    Filesize

    72KB

  • memory/1592-170-0x0000000018F20000-0x000000001902A000-memory.dmp

    Filesize

    1.0MB

  • memory/1592-168-0x00000000181B0000-0x00000000181C0000-memory.dmp

    Filesize

    64KB

  • memory/1592-169-0x00000000193F0000-0x0000000019A08000-memory.dmp

    Filesize

    6.1MB

  • memory/2308-152-0x00000000054A0000-0x0000000005506000-memory.dmp

    Filesize

    408KB

  • memory/2308-180-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-165-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-164-0x0000000006E80000-0x0000000006E9A000-memory.dmp

    Filesize

    104KB

  • memory/2308-163-0x00000000074E0000-0x0000000007B5A000-memory.dmp

    Filesize

    6.5MB

  • memory/2308-162-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-143-0x00000000021B0000-0x00000000021E6000-memory.dmp

    Filesize

    216KB

  • memory/2308-174-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-175-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-176-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-161-0x0000000006DE0000-0x0000000006E56000-memory.dmp

    Filesize

    472KB

  • memory/2308-160-0x0000000006060000-0x00000000060A4000-memory.dmp

    Filesize

    272KB

  • memory/2308-159-0x0000000005AE0000-0x0000000005AFE000-memory.dmp

    Filesize

    120KB

  • memory/2308-166-0x0000000007BD0000-0x0000000007BF2000-memory.dmp

    Filesize

    136KB

  • memory/2308-157-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-158-0x0000000004720000-0x0000000004730000-memory.dmp

    Filesize

    64KB

  • memory/2308-151-0x0000000005430000-0x0000000005496000-memory.dmp

    Filesize

    408KB

  • memory/2308-150-0x0000000004D10000-0x0000000004D32000-memory.dmp

    Filesize

    136KB

  • memory/2308-144-0x0000000004D60000-0x0000000005388000-memory.dmp

    Filesize

    6.2MB

  • memory/4976-173-0x00000000307B0000-0x00000000307C0000-memory.dmp

    Filesize

    64KB

  • memory/4976-142-0x00000000307B0000-0x00000000307C0000-memory.dmp

    Filesize

    64KB

  • memory/4976-141-0x0000000030950000-0x000000003095A000-memory.dmp

    Filesize

    40KB

  • memory/4976-140-0x0000000030980000-0x0000000030A12000-memory.dmp

    Filesize

    584KB

  • memory/4976-139-0x00000000350E0000-0x0000000035684000-memory.dmp

    Filesize

    5.6MB

  • memory/4976-138-0x00000000005D0000-0x00000000015D0000-memory.dmp

    Filesize

    16.0MB