Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/06/2023, 09:48

General

  • Target

    file.exe

  • Size

    575KB

  • MD5

    7e1c47ca9cef11631ddd096c1d3639c7

  • SHA1

    4e8d9b1efb8b4b7b316e5a7fd3fb808e2da759a8

  • SHA256

    02c640ef3ac9d7fa8c919b0f72bb85413ef3e9803d2d091277b9a7c41f52e9d9

  • SHA512

    fa029905bf1921ab433f949167e64874e5da3e98908da38c92ae8e4db987a6ab786f68942993e34c92f713d7bf701e4d066da9abde7b88b6ff018663ba79490a

  • SSDEEP

    6144:qTov37S4OHn8MDIYKReFMjkyI/VYXVhUYbjDyVlQBCVTI:qcv37SajRVjziVq3gVlsCVT

Malware Config

Extracted

Family

redline

Botnet

2

C2

95.216.249.153:81

Attributes
  • auth_value

    101013a5e99e0857595aae297a11351d

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 3 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe
        "C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:5052
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:3364
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 296
              4⤵
              • Program crash
              PID:1816
          • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe
            "C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              4⤵
              • Executes dropped EXE
              PID:3604
          • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe
            "C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4820
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
              • Adds Run key to start application
              PID:1292
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 296
              4⤵
              • Program crash
              PID:2672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 292
          2⤵
          • Program crash
          PID:2436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1996 -ip 1996
        1⤵
          PID:2944
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4948 -ip 4948
          1⤵
            PID:416
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4820 -ip 4820
            1⤵
              PID:4640

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

              Filesize

              3.8MB

              MD5

              68be007bd3fa09d26fcee584a9157770

              SHA1

              6f191c0587c8055f26367f25ce0f7787ca272714

              SHA256

              71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

              SHA512

              f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

            • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

              Filesize

              3.8MB

              MD5

              68be007bd3fa09d26fcee584a9157770

              SHA1

              6f191c0587c8055f26367f25ce0f7787ca272714

              SHA256

              71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

              SHA512

              f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

            • C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe

              Filesize

              3.8MB

              MD5

              68be007bd3fa09d26fcee584a9157770

              SHA1

              6f191c0587c8055f26367f25ce0f7787ca272714

              SHA256

              71acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e

              SHA512

              f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245

            • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

              Filesize

              412KB

              MD5

              42851869d2ed62806999dd416ff9f45b

              SHA1

              46333b2f7ddf326a774b43ea2d66ed681486fd34

              SHA256

              a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6

              SHA512

              43e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f

            • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

              Filesize

              412KB

              MD5

              42851869d2ed62806999dd416ff9f45b

              SHA1

              46333b2f7ddf326a774b43ea2d66ed681486fd34

              SHA256

              a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6

              SHA512

              43e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f

            • C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe

              Filesize

              412KB

              MD5

              42851869d2ed62806999dd416ff9f45b

              SHA1

              46333b2f7ddf326a774b43ea2d66ed681486fd34

              SHA256

              a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6

              SHA512

              43e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f

            • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe

              Filesize

              2.9MB

              MD5

              73e4eccfbd36690b22434b8edaeab4bf

              SHA1

              dd7f7c0577149ddc9302998c00ac9846498c973b

              SHA256

              ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a

              SHA512

              a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127

            • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe

              Filesize

              2.9MB

              MD5

              73e4eccfbd36690b22434b8edaeab4bf

              SHA1

              dd7f7c0577149ddc9302998c00ac9846498c973b

              SHA256

              ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a

              SHA512

              a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127

            • C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe

              Filesize

              2.9MB

              MD5

              73e4eccfbd36690b22434b8edaeab4bf

              SHA1

              dd7f7c0577149ddc9302998c00ac9846498c973b

              SHA256

              ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a

              SHA512

              a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127

            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

              Filesize

              809.8MB

              MD5

              0c729ed30f6d5a31a3601d93968b0856

              SHA1

              72983b3cbba12cdd953c499d8acf99e2beb75c05

              SHA256

              a042eb231b414b2d4bbd0ab97a64a33f5b29a64ef2b980144c346732bf936e98

              SHA512

              649bc4abed9e089cfc14bf160202b87b3ceafe4186bf4349ab255f2e34361cf37fcf1b401e3656e250e60a4ac37a19d4d4c82078b93f23ad57bfc4577c90b798

            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

              Filesize

              809.8MB

              MD5

              0c729ed30f6d5a31a3601d93968b0856

              SHA1

              72983b3cbba12cdd953c499d8acf99e2beb75c05

              SHA256

              a042eb231b414b2d4bbd0ab97a64a33f5b29a64ef2b980144c346732bf936e98

              SHA512

              649bc4abed9e089cfc14bf160202b87b3ceafe4186bf4349ab255f2e34361cf37fcf1b401e3656e250e60a4ac37a19d4d4c82078b93f23ad57bfc4577c90b798

            • memory/1292-200-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1292-199-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1292-193-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/4532-139-0x000000000A8B0000-0x000000000A9BA000-memory.dmp

              Filesize

              1.0MB

            • memory/4532-140-0x000000000A7F0000-0x000000000A802000-memory.dmp

              Filesize

              72KB

            • memory/4532-150-0x00000000052B0000-0x00000000052C0000-memory.dmp

              Filesize

              64KB

            • memory/4532-145-0x000000000BDB0000-0x000000000BE16000-memory.dmp

              Filesize

              408KB

            • memory/4532-143-0x000000000AB60000-0x000000000ABD6000-memory.dmp

              Filesize

              472KB

            • memory/4532-142-0x00000000052B0000-0x00000000052C0000-memory.dmp

              Filesize

              64KB

            • memory/4532-141-0x000000000A850000-0x000000000A88C000-memory.dmp

              Filesize

              240KB

            • memory/4532-133-0x0000000000400000-0x0000000000430000-memory.dmp

              Filesize

              192KB

            • memory/4532-144-0x000000000AC80000-0x000000000AD12000-memory.dmp

              Filesize

              584KB

            • memory/4532-138-0x000000000AD60000-0x000000000B378000-memory.dmp

              Filesize

              6.1MB

            • memory/4532-149-0x000000000C260000-0x000000000C2B0000-memory.dmp

              Filesize

              320KB

            • memory/4532-148-0x000000000CFE0000-0x000000000D50C000-memory.dmp

              Filesize

              5.2MB

            • memory/4532-147-0x000000000C2D0000-0x000000000C492000-memory.dmp

              Filesize

              1.8MB

            • memory/4532-146-0x000000000C500000-0x000000000CAA4000-memory.dmp

              Filesize

              5.6MB

            • memory/5052-159-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB