Analysis

  • max time kernel
    144s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2023 10:08

General

  • Target

    file.exe

  • Size

    1.1MB

  • MD5

    05d2607674b12556392ad7d31c498bb2

  • SHA1

    6a30c01505a666f109502e563df48287fc68af7b

  • SHA256

    dc4df62efb7c9b410401653297e66098809afa302874d98711b82e20864a8049

  • SHA512

    4f9019a34c89cc49b29ae808e272a5acb5e6bb18b4369cf826cc2ce46b41586418494ad535ef7d95408c86ff468457bb5227db619b0c64381172b3eecb77f549

  • SSDEEP

    6144:vhMIAaYKyQdiU+oboLaSORJ3k5QH2rCfdOrAOGLNf9C42PVWI/L6VGuXZ:vhMvaYTQdiU+oboLLuiELNOPVWIzmfZ

Malware Config

Extracted

Family

redline

Botnet

2

C2

95.216.249.153:81

Attributes
  • auth_value

    101013a5e99e0857595aae297a11351d

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe
        "C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe"
        3⤵
        • Executes dropped EXE
        PID:1468
      • C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe
        "C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1904
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:1804
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 48
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:360
        • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe
          "C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            4⤵
            • Executes dropped EXE
            PID:7504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 48
        2⤵
        • Program crash
        PID:436

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      15011a89c0290e673b1f128c470b4f57

      SHA1

      b920e3828e35b7ac32aab0a23a473aa5bd3c1776

      SHA256

      8dc32991d67156de7162ced43cc0c0eba58ac1f19c8683ff03b4b1c6309e24ab

      SHA512

      705def292e810442c81e56f8184075c2cd8586c560348db1b9403fa902c68d580dcd62a364a38c46d9c816d881f49253115f2f03838141794e74ddb4aa1afd68

    • C:\Users\Admin\AppData\Local\Temp\Cab6D66.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • C:\Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • C:\Users\Admin\AppData\Local\Temp\Tar70B7.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • C:\Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      3d1c5a5c3b3519d8c218a7d6a7ec6338

      SHA1

      0793c4ea75b2412bbde9e11578c5f4c843c40d34

      SHA256

      0090df94f66f8f795143b91f46ffd11314e9fb3735f63b28b8724f819beb5296

      SHA512

      398db451d6b6b3f28e92ffa295c45ed927f127271b5ee90b643d41ee64d42fe9d8478b2225ee3bce589a0c057db6e57c57a366e008a79ae76135005dc6351348

    • C:\Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      3d1c5a5c3b3519d8c218a7d6a7ec6338

      SHA1

      0793c4ea75b2412bbde9e11578c5f4c843c40d34

      SHA256

      0090df94f66f8f795143b91f46ffd11314e9fb3735f63b28b8724f819beb5296

      SHA512

      398db451d6b6b3f28e92ffa295c45ed927f127271b5ee90b643d41ee64d42fe9d8478b2225ee3bce589a0c057db6e57c57a366e008a79ae76135005dc6351348

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      173.0MB

      MD5

      b4a64cd6e0e182841bafd0636a8fe814

      SHA1

      f982454453f9583d1e96d7eca5064f45f8d9049b

      SHA256

      ff701f3a3c214e288eeb582dcbc4e0e29e9e415a698cd6c67b99e3ffbcfe12c3

      SHA512

      ee84f5082557c0c77c263f0e3f1427eb3106d4ee78600ce79bec25dddab17de0d1012fb56cb3795ba3129a2be1494eb167e73efc2e3b93c7abfed57f337ffa9d

    • \Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • \Users\Admin\AppData\Local\Temp\Doej4oa.exe

      Filesize

      3.8MB

      MD5

      68be007bd3fa09d26fcee584a9157770

      SHA1

      6f191c0587c8055f26367f25ce0f7787ca272714

      SHA256

      71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

      SHA512

      f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

    • \Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • \Users\Admin\AppData\Local\Temp\Upshot_o.exe

      Filesize

      6.5MB

      MD5

      583336f1531f78ffc2cc8ef84da256e1

      SHA1

      a4cb0c4123c5bb8abd45d8d320c44782d4de3e33

      SHA256

      0218aabfe9a1a51116ff85ce7bbba907ded9ca015d23fe2e8e494d695ab9f411

      SHA512

      f1daa8357a6995fe5be8394d54350df4be9494319261fbb80bd812e9b2c9cecf4c3810d29f872a2f37bd186c2574526155dfd3ea75f5499a03ed8e9df37524e8

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      3d1c5a5c3b3519d8c218a7d6a7ec6338

      SHA1

      0793c4ea75b2412bbde9e11578c5f4c843c40d34

      SHA256

      0090df94f66f8f795143b91f46ffd11314e9fb3735f63b28b8724f819beb5296

      SHA512

      398db451d6b6b3f28e92ffa295c45ed927f127271b5ee90b643d41ee64d42fe9d8478b2225ee3bce589a0c057db6e57c57a366e008a79ae76135005dc6351348

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      3d1c5a5c3b3519d8c218a7d6a7ec6338

      SHA1

      0793c4ea75b2412bbde9e11578c5f4c843c40d34

      SHA256

      0090df94f66f8f795143b91f46ffd11314e9fb3735f63b28b8724f819beb5296

      SHA512

      398db451d6b6b3f28e92ffa295c45ed927f127271b5ee90b643d41ee64d42fe9d8478b2225ee3bce589a0c057db6e57c57a366e008a79ae76135005dc6351348

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      3d1c5a5c3b3519d8c218a7d6a7ec6338

      SHA1

      0793c4ea75b2412bbde9e11578c5f4c843c40d34

      SHA256

      0090df94f66f8f795143b91f46ffd11314e9fb3735f63b28b8724f819beb5296

      SHA512

      398db451d6b6b3f28e92ffa295c45ed927f127271b5ee90b643d41ee64d42fe9d8478b2225ee3bce589a0c057db6e57c57a366e008a79ae76135005dc6351348

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      3d1c5a5c3b3519d8c218a7d6a7ec6338

      SHA1

      0793c4ea75b2412bbde9e11578c5f4c843c40d34

      SHA256

      0090df94f66f8f795143b91f46ffd11314e9fb3735f63b28b8724f819beb5296

      SHA512

      398db451d6b6b3f28e92ffa295c45ed927f127271b5ee90b643d41ee64d42fe9d8478b2225ee3bce589a0c057db6e57c57a366e008a79ae76135005dc6351348

    • \Users\Admin\AppData\Local\Temp\ajetr2fx.exe

      Filesize

      3.4MB

      MD5

      3d1c5a5c3b3519d8c218a7d6a7ec6338

      SHA1

      0793c4ea75b2412bbde9e11578c5f4c843c40d34

      SHA256

      0090df94f66f8f795143b91f46ffd11314e9fb3735f63b28b8724f819beb5296

      SHA512

      398db451d6b6b3f28e92ffa295c45ed927f127271b5ee90b643d41ee64d42fe9d8478b2225ee3bce589a0c057db6e57c57a366e008a79ae76135005dc6351348

    • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      172.2MB

      MD5

      b7258c1b054bfdd85baa88cb4ab2e596

      SHA1

      eac6fb7cd9924417f284b9c06fe51a4c35b28a20

      SHA256

      c2a2a62d7041b4016ed9deb5408a32b00b47e1c798da03f38d83a8bd957d3021

      SHA512

      2b72689c23e01c503bd54db142a00b8abea9229bb22394dd041ee565b1277e9b46635ff0b6c246b6977db224347fa04c94ca7bd134fac57ab9af840334be791c

    • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      173.4MB

      MD5

      828ba679ee8dd8ec87988a0806fde736

      SHA1

      a8143064317caad6cc80a78ca5a2768310477a51

      SHA256

      cbc9bd072455a517430f3bec7da73b1fc9b10d016269ad32c82fc6c963a7c984

      SHA512

      77231ed489b6926e805c6abbf34b4f59e893f7abc8fff048ae4a98ac239015f3aff2e045beb6d8e7c60dedc6e0c2ea5d4706a3a9d735eeaae14066530c75df5c

    • memory/940-64-0x00000000048A0000-0x00000000048E0000-memory.dmp

      Filesize

      256KB

    • memory/940-55-0x0000000000090000-0x00000000000C0000-memory.dmp

      Filesize

      192KB

    • memory/940-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/940-65-0x00000000048A0000-0x00000000048E0000-memory.dmp

      Filesize

      256KB

    • memory/940-54-0x0000000000090000-0x00000000000C0000-memory.dmp

      Filesize

      192KB

    • memory/940-61-0x0000000000090000-0x00000000000C0000-memory.dmp

      Filesize

      192KB

    • memory/940-62-0x0000000000090000-0x00000000000C0000-memory.dmp

      Filesize

      192KB

    • memory/940-63-0x00000000004B0000-0x00000000004B6000-memory.dmp

      Filesize

      24KB

    • memory/1468-142-0x0000000000020000-0x0000000000026000-memory.dmp

      Filesize

      24KB

    • memory/1468-144-0x0000000000020000-0x0000000000026000-memory.dmp

      Filesize

      24KB

    • memory/1468-143-0x0000000000020000-0x0000000000026000-memory.dmp

      Filesize

      24KB

    • memory/1804-221-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1804-219-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1804-218-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1804-195-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/1804-184-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB