Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 20:56

General

  • Target

    6fb6cfdca040bd1e7ab1256d37306416.exe

  • Size

    741KB

  • MD5

    6fb6cfdca040bd1e7ab1256d37306416

  • SHA1

    f9f8270d2186a27a3f7301e4e3d3cccc73bab0ad

  • SHA256

    0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9

  • SHA512

    0e4c654863528e97d67741734217d37d0cec03d9bf9cbe9e66543e614566d9e163c5b8455548352b56a706225937bbc5dc17c5c9a8e52e99637b6885ef2d0ad3

  • SSDEEP

    6144:25G0py2KhkpK60W2VuTLx7AV35pDNvB/PQs6AvLTJ:25M2KhkpWWYuHxU3pDNvB/PHXLTJ

Malware Config

Extracted

Family

redline

Botnet

1

C2

95.216.249.153:81

Attributes
  • auth_value

    a290efd4796d37556cc5af7e83c91346

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fb6cfdca040bd1e7ab1256d37306416.exe
    "C:\Users\Admin\AppData\Local\Temp\6fb6cfdca040bd1e7ab1256d37306416.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe
        "C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:448
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:1856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 308
            4⤵
            • Program crash
            PID:2428
        • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe
          "C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            4⤵
            • Executes dropped EXE
            PID:4512
        • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe
          "C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:5112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 276
        2⤵
        • Program crash
        PID:3660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1028 -ip 1028
      1⤵
        PID:2644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 448 -ip 448
        1⤵
          PID:228

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

          Filesize

          3.8MB

          MD5

          68be007bd3fa09d26fcee584a9157770

          SHA1

          6f191c0587c8055f26367f25ce0f7787ca272714

          SHA256

          71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

          SHA512

          f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

        • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

          Filesize

          3.8MB

          MD5

          68be007bd3fa09d26fcee584a9157770

          SHA1

          6f191c0587c8055f26367f25ce0f7787ca272714

          SHA256

          71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

          SHA512

          f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

        • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

          Filesize

          3.8MB

          MD5

          68be007bd3fa09d26fcee584a9157770

          SHA1

          6f191c0587c8055f26367f25ce0f7787ca272714

          SHA256

          71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

          SHA512

          f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

        • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

          Filesize

          229KB

          MD5

          8c76e949a6b3bfb992ceb54c3be68f69

          SHA1

          32892363bea5d921144baac2017e4ca06ecf8269

          SHA256

          682dc9f1350f3cfab2740e249fc00639927e0a53e8598e07611425dad2821719

          SHA512

          2f949be9e7275067306338cd91331f21bc60bf4f0a1479b2953a199619d5a21f54d31031bf66c89662871eedd72d751f733c89cfefbb22a4fe6bbe06c1823ac8

        • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

          Filesize

          229KB

          MD5

          8c76e949a6b3bfb992ceb54c3be68f69

          SHA1

          32892363bea5d921144baac2017e4ca06ecf8269

          SHA256

          682dc9f1350f3cfab2740e249fc00639927e0a53e8598e07611425dad2821719

          SHA512

          2f949be9e7275067306338cd91331f21bc60bf4f0a1479b2953a199619d5a21f54d31031bf66c89662871eedd72d751f733c89cfefbb22a4fe6bbe06c1823ac8

        • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

          Filesize

          229KB

          MD5

          8c76e949a6b3bfb992ceb54c3be68f69

          SHA1

          32892363bea5d921144baac2017e4ca06ecf8269

          SHA256

          682dc9f1350f3cfab2740e249fc00639927e0a53e8598e07611425dad2821719

          SHA512

          2f949be9e7275067306338cd91331f21bc60bf4f0a1479b2953a199619d5a21f54d31031bf66c89662871eedd72d751f733c89cfefbb22a4fe6bbe06c1823ac8

        • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe

          Filesize

          3.0MB

          MD5

          8adb6bf170d9e58bd51021619c8d74a0

          SHA1

          fe37f27bb1c348e21ff0f656ed3efd100627f199

          SHA256

          8e12d8cb25a85392d8e14d429b725c635776731d1546ad5d8c88afb09e8e2856

          SHA512

          63e50768c6c057f6fca5855827adcfcaef198b67dd6fa3f874278cf0a6937ad4dec0d26e366ac3873aa92aee1510acb632b188af8031502d9382fb0e0140d3da

        • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe

          Filesize

          3.0MB

          MD5

          8adb6bf170d9e58bd51021619c8d74a0

          SHA1

          fe37f27bb1c348e21ff0f656ed3efd100627f199

          SHA256

          8e12d8cb25a85392d8e14d429b725c635776731d1546ad5d8c88afb09e8e2856

          SHA512

          63e50768c6c057f6fca5855827adcfcaef198b67dd6fa3f874278cf0a6937ad4dec0d26e366ac3873aa92aee1510acb632b188af8031502d9382fb0e0140d3da

        • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe

          Filesize

          3.0MB

          MD5

          8adb6bf170d9e58bd51021619c8d74a0

          SHA1

          fe37f27bb1c348e21ff0f656ed3efd100627f199

          SHA256

          8e12d8cb25a85392d8e14d429b725c635776731d1546ad5d8c88afb09e8e2856

          SHA512

          63e50768c6c057f6fca5855827adcfcaef198b67dd6fa3f874278cf0a6937ad4dec0d26e366ac3873aa92aee1510acb632b188af8031502d9382fb0e0140d3da

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          811.8MB

          MD5

          24a5a6608aefba7f366fd009d46b5aa1

          SHA1

          cb28ca25d6360ab43af8a9e2f4cb12fa14613f9f

          SHA256

          ab33a487621400a754669cd0a637ef98b482eb8576a1f3654757af580fa22f34

          SHA512

          419783500933278281a9745456dd8b9ba669ea9fdf874262a4a987df4f62911bbc8cf417bc6b5342ff91be200c55ee5613bdf47ab94b73ab23c0b7540374e168

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          811.8MB

          MD5

          24a5a6608aefba7f366fd009d46b5aa1

          SHA1

          cb28ca25d6360ab43af8a9e2f4cb12fa14613f9f

          SHA256

          ab33a487621400a754669cd0a637ef98b482eb8576a1f3654757af580fa22f34

          SHA512

          419783500933278281a9745456dd8b9ba669ea9fdf874262a4a987df4f62911bbc8cf417bc6b5342ff91be200c55ee5613bdf47ab94b73ab23c0b7540374e168

        • memory/1856-159-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4668-149-0x000000000DAB0000-0x000000000DFDC000-memory.dmp

          Filesize

          5.2MB

        • memory/4668-142-0x00000000054E0000-0x00000000054F0000-memory.dmp

          Filesize

          64KB

        • memory/4668-133-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/4668-144-0x000000000AF00000-0x000000000AF92000-memory.dmp

          Filesize

          584KB

        • memory/4668-148-0x000000000CAA0000-0x000000000CC62000-memory.dmp

          Filesize

          1.8MB

        • memory/4668-147-0x000000000C040000-0x000000000C090000-memory.dmp

          Filesize

          320KB

        • memory/4668-143-0x000000000ADE0000-0x000000000AE56000-memory.dmp

          Filesize

          472KB

        • memory/4668-150-0x00000000054E0000-0x00000000054F0000-memory.dmp

          Filesize

          64KB

        • memory/4668-141-0x000000000AAD0000-0x000000000AB0C000-memory.dmp

          Filesize

          240KB

        • memory/4668-140-0x000000000AA70000-0x000000000AA82000-memory.dmp

          Filesize

          72KB

        • memory/4668-139-0x000000000AB30000-0x000000000AC3A000-memory.dmp

          Filesize

          1.0MB

        • memory/4668-138-0x000000000AFD0000-0x000000000B5E8000-memory.dmp

          Filesize

          6.1MB

        • memory/4668-145-0x000000000C320000-0x000000000C8C4000-memory.dmp

          Filesize

          5.6MB

        • memory/4668-146-0x000000000BE20000-0x000000000BE86000-memory.dmp

          Filesize

          408KB

        • memory/5112-195-0x0000000000890000-0x0000000000894000-memory.dmp

          Filesize

          16KB

        • memory/5112-200-0x0000000000400000-0x00000000004AF000-memory.dmp

          Filesize

          700KB