Analysis

  • max time kernel
    65s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2023 06:48

General

  • Target

    0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe

  • Size

    741KB

  • MD5

    6fb6cfdca040bd1e7ab1256d37306416

  • SHA1

    f9f8270d2186a27a3f7301e4e3d3cccc73bab0ad

  • SHA256

    0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9

  • SHA512

    0e4c654863528e97d67741734217d37d0cec03d9bf9cbe9e66543e614566d9e163c5b8455548352b56a706225937bbc5dc17c5c9a8e52e99637b6885ef2d0ad3

  • SSDEEP

    6144:25G0py2KhkpK60W2VuTLx7AV35pDNvB/PQs6AvLTJ:25M2KhkpWWYuHxU3pDNvB/PHXLTJ

Malware Config

Extracted

Family

redline

Botnet

1

C2

95.216.249.153:81

Attributes
  • auth_value

    a290efd4796d37556cc5af7e83c91346

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe
    "C:\Users\Admin\AppData\Local\Temp\0e59fafb2de30f5fa5b6cce425f40115180b373592e1a201702742a6e8f21cc9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe
        "C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1240
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Executes dropped EXE
          PID:2228
      • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe
        "C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3636
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2356
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 296
            4⤵
            • Program crash
            PID:4348
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 312
        2⤵
        • Program crash
        PID:2052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1736 -ip 1736
      1⤵
        PID:3288
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3636 -ip 3636
        1⤵
          PID:1452

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

          Filesize

          3.8MB

          MD5

          68be007bd3fa09d26fcee584a9157770

          SHA1

          6f191c0587c8055f26367f25ce0f7787ca272714

          SHA256

          71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

          SHA512

          f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

        • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

          Filesize

          3.8MB

          MD5

          68be007bd3fa09d26fcee584a9157770

          SHA1

          6f191c0587c8055f26367f25ce0f7787ca272714

          SHA256

          71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

          SHA512

          f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

        • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

          Filesize

          3.8MB

          MD5

          68be007bd3fa09d26fcee584a9157770

          SHA1

          6f191c0587c8055f26367f25ce0f7787ca272714

          SHA256

          71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

          SHA512

          f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

        • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

          Filesize

          412KB

          MD5

          42851869d2ed62806999dd416ff9f45b

          SHA1

          46333b2f7ddf326a774b43ea2d66ed681486fd34

          SHA256

          a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6

          SHA512

          43e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f

        • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

          Filesize

          412KB

          MD5

          42851869d2ed62806999dd416ff9f45b

          SHA1

          46333b2f7ddf326a774b43ea2d66ed681486fd34

          SHA256

          a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6

          SHA512

          43e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f

        • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

          Filesize

          412KB

          MD5

          42851869d2ed62806999dd416ff9f45b

          SHA1

          46333b2f7ddf326a774b43ea2d66ed681486fd34

          SHA256

          a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6

          SHA512

          43e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          677.9MB

          MD5

          6f616f450976646375414f7af15a98ee

          SHA1

          26a2b73c2bf7836926d8ad8cbfbe1f8a09d12e75

          SHA256

          76640076efa0dacf1bbc6adb12b9483f2489158484a67aa659f71b639eeb0288

          SHA512

          f3b5dfb958e3b83e5632c0122eab44e1f4a1e9deeb628ab7003021205d2a1300c250a77d6eb22bee39da3c265f68fd0dcda6b1704a26aa46e78e3dbc67b4cc18

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          681.9MB

          MD5

          75925f1dfbcf118245f97a299beb354f

          SHA1

          d425ddabd5a46b6891cc11932f97d12c38c9ae54

          SHA256

          a936632f59b34d8dae7ba21f54b1ee426d406b6efa235146fd1508b351cb543f

          SHA512

          9d2dc995c8e4be2ae1f685ce8eb3e765771389e474b701333fcd181586254709a91e54c431d3834db5d1c5a6ba37527bf143308126f06371e0b81b5d4fe24426

        • memory/2356-174-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2356-173-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2356-167-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/3680-143-0x000000000A890000-0x000000000A906000-memory.dmp

          Filesize

          472KB

        • memory/3680-144-0x000000000A9B0000-0x000000000AA42000-memory.dmp

          Filesize

          584KB

        • memory/3680-150-0x0000000005040000-0x0000000005050000-memory.dmp

          Filesize

          64KB

        • memory/3680-148-0x000000000C4B0000-0x000000000C672000-memory.dmp

          Filesize

          1.8MB

        • memory/3680-147-0x000000000BC10000-0x000000000BC60000-memory.dmp

          Filesize

          320KB

        • memory/3680-146-0x000000000BA40000-0x000000000BAA6000-memory.dmp

          Filesize

          408KB

        • memory/3680-145-0x000000000BF00000-0x000000000C4A4000-memory.dmp

          Filesize

          5.6MB

        • memory/3680-149-0x000000000CBB0000-0x000000000D0DC000-memory.dmp

          Filesize

          5.2MB

        • memory/3680-133-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/3680-142-0x0000000005040000-0x0000000005050000-memory.dmp

          Filesize

          64KB

        • memory/3680-141-0x000000000A580000-0x000000000A5BC000-memory.dmp

          Filesize

          240KB

        • memory/3680-140-0x000000000A520000-0x000000000A532000-memory.dmp

          Filesize

          72KB

        • memory/3680-139-0x000000000A5E0000-0x000000000A6EA000-memory.dmp

          Filesize

          1.0MB

        • memory/3680-138-0x000000000AAF0000-0x000000000B108000-memory.dmp

          Filesize

          6.1MB