Analysis

  • max time kernel
    299s
  • max time network
    259s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-07-2023 23:59

General

  • Target

    46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe

  • Size

    2.6MB

  • MD5

    65482e3a11dff25a26f8b9667999ae5f

  • SHA1

    967455baa933e5122008db83ebf0f0be29d8afa1

  • SHA256

    46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1

  • SHA512

    d4475480c623ddf2a648977af78548470a56e115990018fc91b354b939949a36f7dd84822d4dee54c3a9df690b4d70deef43eb55420f38fe9186a9d26fd1c6b3

  • SSDEEP

    49152:DLZTeIJtQrmRw7mGRPsIbGHH04cmjloa2TouNMjTuyRQeWhKIjAkSt80rY:D5IrmRwKGSTHtjWa2cbTuySeWhKCSvY

Malware Config

Extracted

Family

redline

Botnet

090723_rc_11

C2

rcam.tuktuk.ug:11290

Attributes
  • auth_value

    abd581cdd66d51ad306682319cafa5a0

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe
    "C:\Users\Admin\AppData\Local\Temp\46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Users\Admin\AppData\Local\Temp\chrome.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\chrome.exe

    Filesize

    4.4MB

    MD5

    f2e100f576b44fdb37d874db2e48085c

    SHA1

    23091a0b5231d69d85866fede573b25577e20414

    SHA256

    77530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196

    SHA512

    14bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85

  • C:\Users\Admin\AppData\Local\Temp\chrome.exe

    Filesize

    4.4MB

    MD5

    f2e100f576b44fdb37d874db2e48085c

    SHA1

    23091a0b5231d69d85866fede573b25577e20414

    SHA256

    77530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196

    SHA512

    14bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    750.4MB

    MD5

    c0743daea1eef70fcc46c5e7da39ef3e

    SHA1

    ddbf50c90dffa3d7d59b62a0175ea0c78f64ed88

    SHA256

    264b2b5735de7b0adae53ad3223076a957a350dbcdf691e6b90ca3c6daf03722

    SHA512

    ea7b306ead66b3b457ac4dddb9246ed8452756e135f4bd38dc5c04a0aa34a8148e5ec538156cb448967b72ba1d51740a5879fcd792a904f3b3c886edea6d3b12

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    750.4MB

    MD5

    c0743daea1eef70fcc46c5e7da39ef3e

    SHA1

    ddbf50c90dffa3d7d59b62a0175ea0c78f64ed88

    SHA256

    264b2b5735de7b0adae53ad3223076a957a350dbcdf691e6b90ca3c6daf03722

    SHA512

    ea7b306ead66b3b457ac4dddb9246ed8452756e135f4bd38dc5c04a0aa34a8148e5ec538156cb448967b72ba1d51740a5879fcd792a904f3b3c886edea6d3b12

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    750.4MB

    MD5

    c0743daea1eef70fcc46c5e7da39ef3e

    SHA1

    ddbf50c90dffa3d7d59b62a0175ea0c78f64ed88

    SHA256

    264b2b5735de7b0adae53ad3223076a957a350dbcdf691e6b90ca3c6daf03722

    SHA512

    ea7b306ead66b3b457ac4dddb9246ed8452756e135f4bd38dc5c04a0aa34a8148e5ec538156cb448967b72ba1d51740a5879fcd792a904f3b3c886edea6d3b12

  • memory/2124-182-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-184-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-181-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-180-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-179-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-178-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-177-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-176-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-175-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/2124-187-0x00000000010C0000-0x0000000001A15000-memory.dmp

    Filesize

    9.3MB

  • memory/3012-155-0x0000000000E10000-0x0000000000E16000-memory.dmp

    Filesize

    24KB

  • memory/3012-164-0x000000000A5A0000-0x000000000A606000-memory.dmp

    Filesize

    408KB

  • memory/3012-168-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3012-167-0x000000000CEB0000-0x000000000D3DC000-memory.dmp

    Filesize

    5.2MB

  • memory/3012-151-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3012-166-0x000000000C7B0000-0x000000000C972000-memory.dmp

    Filesize

    1.8MB

  • memory/3012-165-0x000000000B630000-0x000000000BB2E000-memory.dmp

    Filesize

    5.0MB

  • memory/3012-156-0x000000000A7E0000-0x000000000ADE6000-memory.dmp

    Filesize

    6.0MB

  • memory/3012-157-0x000000000A2E0000-0x000000000A3EA000-memory.dmp

    Filesize

    1.0MB

  • memory/3012-158-0x0000000004D00000-0x0000000004D12000-memory.dmp

    Filesize

    72KB

  • memory/3012-159-0x000000000A210000-0x000000000A24E000-memory.dmp

    Filesize

    248KB

  • memory/3012-160-0x000000000A250000-0x000000000A29B000-memory.dmp

    Filesize

    300KB

  • memory/3012-161-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3012-162-0x000000000A520000-0x000000000A596000-memory.dmp

    Filesize

    472KB

  • memory/3012-163-0x000000000A640000-0x000000000A6D2000-memory.dmp

    Filesize

    584KB

  • memory/3840-204-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-207-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-221-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-220-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-219-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-218-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-217-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-216-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-215-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-214-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-213-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-212-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-211-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-210-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-209-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-208-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-206-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-205-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-202-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-201-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-189-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-190-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-191-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-192-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-193-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-194-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-195-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-196-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-197-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-198-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-199-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/3840-200-0x00000000001A0000-0x0000000000AF5000-memory.dmp

    Filesize

    9.3MB

  • memory/4824-132-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-148-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-146-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-124-0x00000000001B0000-0x00000000007FA000-memory.dmp

    Filesize

    6.3MB

  • memory/4824-125-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/4824-117-0x00000000001B0000-0x00000000007FA000-memory.dmp

    Filesize

    6.3MB

  • memory/4824-126-0x00000000055D0000-0x00000000055EC000-memory.dmp

    Filesize

    112KB

  • memory/4824-121-0x00000000001B0000-0x00000000007FA000-memory.dmp

    Filesize

    6.3MB

  • memory/4824-154-0x00000000001B0000-0x00000000007FA000-memory.dmp

    Filesize

    6.3MB

  • memory/4824-122-0x0000000005620000-0x00000000056BC000-memory.dmp

    Filesize

    624KB

  • memory/4824-127-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-134-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-136-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-138-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-140-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-142-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-144-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-130-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-150-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB

  • memory/4824-128-0x00000000055D0000-0x00000000055E5000-memory.dmp

    Filesize

    84KB