Resubmissions

13-06-2023 07:00

230613-hs3zbafg3w 10

13-06-2023 06:39

230613-heq3lafg2t 10

13-06-2023 03:28

230613-d1sq4aee98 10

13-06-2023 03:07

230613-dmpghsfb3z 10

Analysis

  • max time kernel
    700s
  • max time network
    719s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2023 06:39

General

  • Target

    InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe

  • Size

    693.0MB

  • MD5

    fb757b3c077ec1976a8079ca0925e330

  • SHA1

    a8a3c03094572e007b867b5bb9c26acfb182c509

  • SHA256

    f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667

  • SHA512

    6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502

  • SSDEEP

    1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72

Malware Config

Extracted

Family

redline

Botnet

@hendrolas

C2

94.142.138.4:80

Attributes
  • auth_value

    71d16d25eddbb4fd3b98070432f1a757

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Detects Lobshot family 5 IoCs
  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Lobshot

    Lobshot is a backdoor module written in c++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe
    "C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe
      "C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3688
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          C:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3416
          • C:\Users\Admin\AppData\Local\Temp\conhost.exe
            "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:836
            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              6⤵
              • Executes dropped EXE
              PID:3412
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1544
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2124
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1
                7⤵
                • Runs ping.exe
                PID:688
              • C:\ProgramData\service.exe
                "C:\ProgramData\service.exe"
                7⤵
                • Executes dropped EXE
                PID:4920
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4604

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\service.exe

      Filesize

      80KB

      MD5

      b8d23f55d8924b617a57035db1cd3eb0

      SHA1

      94f84b29f47762afa6f44b39dea910286381f296

      SHA256

      921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

      SHA512

      656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

    • C:\ProgramData\service.exe

      Filesize

      80KB

      MD5

      b8d23f55d8924b617a57035db1cd3eb0

      SHA1

      94f84b29f47762afa6f44b39dea910286381f296

      SHA256

      921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

      SHA512

      656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

    • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe

      Filesize

      761.8MB

      MD5

      469b4eb3d9e71ace8bc01d46fe8ec6f3

      SHA1

      489aa9ab8aa9a3f20eacdd418c9c91c1326edac4

      SHA256

      0cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562

      SHA512

      207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c

    • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe

      Filesize

      761.8MB

      MD5

      469b4eb3d9e71ace8bc01d46fe8ec6f3

      SHA1

      489aa9ab8aa9a3f20eacdd418c9c91c1326edac4

      SHA256

      0cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562

      SHA512

      207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bns45np0.t4t.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      4.0MB

      MD5

      feccda803ece2e7a3b7e9798714ad47e

      SHA1

      e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

      SHA256

      14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

      SHA512

      dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

    • C:\Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      4.0MB

      MD5

      feccda803ece2e7a3b7e9798714ad47e

      SHA1

      e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

      SHA256

      14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

      SHA512

      dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

    • C:\Users\Admin\AppData\Local\Temp\conhost.exe

      Filesize

      4.0MB

      MD5

      feccda803ece2e7a3b7e9798714ad47e

      SHA1

      e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

      SHA256

      14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

      SHA512

      dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      80KB

      MD5

      b8d23f55d8924b617a57035db1cd3eb0

      SHA1

      94f84b29f47762afa6f44b39dea910286381f296

      SHA256

      921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

      SHA512

      656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      80KB

      MD5

      b8d23f55d8924b617a57035db1cd3eb0

      SHA1

      94f84b29f47762afa6f44b39dea910286381f296

      SHA256

      921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

      SHA512

      656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      80KB

      MD5

      b8d23f55d8924b617a57035db1cd3eb0

      SHA1

      94f84b29f47762afa6f44b39dea910286381f296

      SHA256

      921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8

      SHA512

      656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      747.0MB

      MD5

      7e0bbb7f25bdd1f0b3e328e191987464

      SHA1

      c8ccf5e9d1e1b3718c8574b60d929052e5ec7751

      SHA256

      27e03594419567de0c9ba12887f421fce8fcfb9ddddc0b900542c1f8425568c3

      SHA512

      e039895943227a086ed0b926620e838c9eced64af63e1f96a21d5164e504fcc0b26f376c7f1c061b2bc27f4f8dfdca109a5fcce1dd9579a0727cc4d229f4d598

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      747.0MB

      MD5

      7e0bbb7f25bdd1f0b3e328e191987464

      SHA1

      c8ccf5e9d1e1b3718c8574b60d929052e5ec7751

      SHA256

      27e03594419567de0c9ba12887f421fce8fcfb9ddddc0b900542c1f8425568c3

      SHA512

      e039895943227a086ed0b926620e838c9eced64af63e1f96a21d5164e504fcc0b26f376c7f1c061b2bc27f4f8dfdca109a5fcce1dd9579a0727cc4d229f4d598

    • memory/1288-138-0x00000000006E0000-0x00000000016E0000-memory.dmp

      Filesize

      16.0MB

    • memory/1288-142-0x0000000034CD0000-0x0000000034CE0000-memory.dmp

      Filesize

      64KB

    • memory/1288-141-0x0000000034C20000-0x0000000034C2A000-memory.dmp

      Filesize

      40KB

    • memory/1288-140-0x0000000034A90000-0x0000000034B22000-memory.dmp

      Filesize

      584KB

    • memory/1288-161-0x0000000034CD0000-0x0000000034CE0000-memory.dmp

      Filesize

      64KB

    • memory/1288-139-0x0000000035040000-0x00000000355E4000-memory.dmp

      Filesize

      5.6MB

    • memory/3416-179-0x000000001DDE0000-0x000000001E30C000-memory.dmp

      Filesize

      5.2MB

    • memory/3416-182-0x0000000017E30000-0x0000000017E40000-memory.dmp

      Filesize

      64KB

    • memory/3416-174-0x0000000018EF0000-0x0000000018F2C000-memory.dmp

      Filesize

      240KB

    • memory/3416-178-0x000000001D6E0000-0x000000001D8A2000-memory.dmp

      Filesize

      1.8MB

    • memory/3416-177-0x000000001CD60000-0x000000001CDB0000-memory.dmp

      Filesize

      320KB

    • memory/3416-183-0x0000000017E30000-0x0000000017E40000-memory.dmp

      Filesize

      64KB

    • memory/3416-175-0x0000000017E30000-0x0000000017E40000-memory.dmp

      Filesize

      64KB

    • memory/3416-170-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3416-171-0x0000000019170000-0x0000000019788000-memory.dmp

      Filesize

      6.1MB

    • memory/3416-172-0x0000000018C40000-0x0000000018D4A000-memory.dmp

      Filesize

      1.0MB

    • memory/3416-173-0x0000000018E90000-0x0000000018EA2000-memory.dmp

      Filesize

      72KB

    • memory/3688-168-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-169-0x00000000087D0000-0x00000000087F2000-memory.dmp

      Filesize

      136KB

    • memory/3688-176-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-167-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-166-0x0000000007910000-0x000000000792A000-memory.dmp

      Filesize

      104KB

    • memory/3688-165-0x0000000008050000-0x00000000086CA000-memory.dmp

      Filesize

      6.5MB

    • memory/3688-180-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-164-0x0000000007950000-0x00000000079C6000-memory.dmp

      Filesize

      472KB

    • memory/3688-163-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-162-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-160-0x0000000005410000-0x0000000005454000-memory.dmp

      Filesize

      272KB

    • memory/3688-159-0x00000000066E0000-0x00000000066FE000-memory.dmp

      Filesize

      120KB

    • memory/3688-158-0x00000000061B0000-0x0000000006216000-memory.dmp

      Filesize

      408KB

    • memory/3688-153-0x0000000005F70000-0x0000000005FD6000-memory.dmp

      Filesize

      408KB

    • memory/3688-147-0x0000000005ED0000-0x0000000005EF2000-memory.dmp

      Filesize

      136KB

    • memory/3688-146-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-145-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/3688-144-0x0000000005830000-0x0000000005E58000-memory.dmp

      Filesize

      6.2MB

    • memory/3688-143-0x00000000050B0000-0x00000000050E6000-memory.dmp

      Filesize

      216KB