Analysis

  • max time kernel
    277s
  • max time network
    288s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2023 04:49

General

  • Target

    b2ce15fdc2b519d9a71fdc576dddd336a1b3a25335bc4ded9c8ec9120e92bbf1.exe

  • Size

    2.8MB

  • MD5

    4fee4dfe32401be36ab9d2f6e41f6228

  • SHA1

    897fe7fb7242cc6ec4964183141a8f0c7d5f172e

  • SHA256

    b2ce15fdc2b519d9a71fdc576dddd336a1b3a25335bc4ded9c8ec9120e92bbf1

  • SHA512

    cb2f786ab00d7e1484cc977f56daf7e555909fdc7a9da14e0f541ef00b58fb8f78241c4cb79dccbe7d99cb7e772c3791d143346c1e75604e98176c121cb55c18

  • SSDEEP

    49152:uxAUjfZ+AnOsIOyocA+YwZavG/Mfow7HSG5RXE10M97MKcGt6I69DpL9PlIvuyJt:Q9gAnWoR+YMav5oUb5RaBptoJpLjOJcw

Malware Config

Extracted

Family

redline

Botnet

210723_rc_11

C2

rcam21.tuktuk.ug:11290

Attributes
  • auth_value

    dd5c2e37dd240447def77d8a4c6244f5

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2ce15fdc2b519d9a71fdc576dddd336a1b3a25335bc4ded9c8ec9120e92bbf1.exe
    "C:\Users\Admin\AppData\Local\Temp\b2ce15fdc2b519d9a71fdc576dddd336a1b3a25335bc4ded9c8ec9120e92bbf1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Users\Admin\AppData\Local\Temp\Notepod.exe
        "C:\Users\Admin\AppData\Local\Temp\Notepod.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:1300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    4.4MB

    MD5

    24c40e66db640789a022cb839b28d476

    SHA1

    b6000f4b0e71ce952267e7e5728bc4181877c497

    SHA256

    6bbcf743fa00cfa33aa60a923d319850111d610b44cfdbe1b5dc6c672f177a8f

    SHA512

    481240b66ac8eb61b8a9aa6e22e14abdffba7869695c7b92214029a714b619319d3c50bc640e79bf790de309d5a412f4e0fecabc1082acd52d1984c8c8f8f0cd

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    4.4MB

    MD5

    24c40e66db640789a022cb839b28d476

    SHA1

    b6000f4b0e71ce952267e7e5728bc4181877c497

    SHA256

    6bbcf743fa00cfa33aa60a923d319850111d610b44cfdbe1b5dc6c672f177a8f

    SHA512

    481240b66ac8eb61b8a9aa6e22e14abdffba7869695c7b92214029a714b619319d3c50bc640e79bf790de309d5a412f4e0fecabc1082acd52d1984c8c8f8f0cd

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    834.4MB

    MD5

    93a8ceb7d4180c7d0cd98229f40bc3e7

    SHA1

    66d7038be4411e18cf52f64f210273c88ef52c6f

    SHA256

    48abef7fc7a3024eaed45c6c58afcd36d309c655d2d23d3cc19aa896c3747a1f

    SHA512

    ae95aa8dd37bc014edf15dd8659aa5f4935208f239331695d24092c2d21ac07f455fb3fea00bb5c0fc1d2977c4cc47407aa97aab5c0bd73c6865955390bd8c65

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    834.4MB

    MD5

    93a8ceb7d4180c7d0cd98229f40bc3e7

    SHA1

    66d7038be4411e18cf52f64f210273c88ef52c6f

    SHA256

    48abef7fc7a3024eaed45c6c58afcd36d309c655d2d23d3cc19aa896c3747a1f

    SHA512

    ae95aa8dd37bc014edf15dd8659aa5f4935208f239331695d24092c2d21ac07f455fb3fea00bb5c0fc1d2977c4cc47407aa97aab5c0bd73c6865955390bd8c65

  • \Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    4.4MB

    MD5

    24c40e66db640789a022cb839b28d476

    SHA1

    b6000f4b0e71ce952267e7e5728bc4181877c497

    SHA256

    6bbcf743fa00cfa33aa60a923d319850111d610b44cfdbe1b5dc6c672f177a8f

    SHA512

    481240b66ac8eb61b8a9aa6e22e14abdffba7869695c7b92214029a714b619319d3c50bc640e79bf790de309d5a412f4e0fecabc1082acd52d1984c8c8f8f0cd

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    834.4MB

    MD5

    93a8ceb7d4180c7d0cd98229f40bc3e7

    SHA1

    66d7038be4411e18cf52f64f210273c88ef52c6f

    SHA256

    48abef7fc7a3024eaed45c6c58afcd36d309c655d2d23d3cc19aa896c3747a1f

    SHA512

    ae95aa8dd37bc014edf15dd8659aa5f4935208f239331695d24092c2d21ac07f455fb3fea00bb5c0fc1d2977c4cc47407aa97aab5c0bd73c6865955390bd8c65

  • memory/1300-166-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-160-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-168-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-164-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-167-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-165-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-170-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-162-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-161-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-169-0x0000000077640000-0x00000000777E9000-memory.dmp

    Filesize

    1.7MB

  • memory/1300-159-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-157-0x0000000077640000-0x00000000777E9000-memory.dmp

    Filesize

    1.7MB

  • memory/1300-158-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-156-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-155-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-171-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-172-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-173-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-174-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/1300-175-0x0000000000BB0000-0x00000000014A2000-memory.dmp

    Filesize

    8.9MB

  • memory/2856-83-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-73-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-93-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-95-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-99-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-97-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-55-0x0000000075B30000-0x0000000075B77000-memory.dmp

    Filesize

    284KB

  • memory/2856-56-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-58-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-57-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-60-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-62-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-64-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-65-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-66-0x0000000077830000-0x0000000077832000-memory.dmp

    Filesize

    8KB

  • memory/2856-63-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-67-0x0000000000160000-0x0000000000802000-memory.dmp

    Filesize

    6.6MB

  • memory/2856-119-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-120-0x0000000075B30000-0x0000000075B77000-memory.dmp

    Filesize

    284KB

  • memory/2856-121-0x0000000000160000-0x0000000000802000-memory.dmp

    Filesize

    6.6MB

  • memory/2856-68-0x0000000000160000-0x0000000000802000-memory.dmp

    Filesize

    6.6MB

  • memory/2856-69-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-91-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-71-0x0000000075B30000-0x0000000075B77000-memory.dmp

    Filesize

    284KB

  • memory/2856-72-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-85-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-74-0x0000000076AC0000-0x0000000076BD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-89-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-75-0x00000000008D0000-0x00000000008EC000-memory.dmp

    Filesize

    112KB

  • memory/2856-76-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-77-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-79-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-81-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/2856-54-0x0000000000160000-0x0000000000802000-memory.dmp

    Filesize

    6.6MB

  • memory/2856-87-0x00000000008D0000-0x00000000008E5000-memory.dmp

    Filesize

    84KB

  • memory/3004-133-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-141-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-142-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-139-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-140-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-145-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-146-0x0000000077640000-0x00000000777E9000-memory.dmp

    Filesize

    1.7MB

  • memory/3004-132-0x0000000077640000-0x00000000777E9000-memory.dmp

    Filesize

    1.7MB

  • memory/3004-137-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-130-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-151-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-152-0x0000000028880000-0x0000000029172000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-153-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-135-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-154-0x0000000077640000-0x00000000777E9000-memory.dmp

    Filesize

    1.7MB

  • memory/3004-134-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-144-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-138-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3004-136-0x00000000012D0000-0x0000000001BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3064-128-0x0000000008080000-0x0000000008972000-memory.dmp

    Filesize

    8.9MB

  • memory/3064-131-0x0000000074880000-0x0000000074F6E000-memory.dmp

    Filesize

    6.9MB

  • memory/3064-123-0x0000000000770000-0x00000000007B0000-memory.dmp

    Filesize

    256KB

  • memory/3064-122-0x0000000074880000-0x0000000074F6E000-memory.dmp

    Filesize

    6.9MB

  • memory/3064-116-0x0000000000770000-0x00000000007B0000-memory.dmp

    Filesize

    256KB

  • memory/3064-115-0x0000000074880000-0x0000000074F6E000-memory.dmp

    Filesize

    6.9MB

  • memory/3064-114-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/3064-113-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3064-111-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3064-109-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3064-108-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/3064-106-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3064-104-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3064-102-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3064-100-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB