Analysis

  • max time kernel
    129s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2023 08:19

General

  • Target

    753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe

  • Size

    2.3MB

  • MD5

    9b06361b484531e8d71b64fbb32534d9

  • SHA1

    6c47e8bfaf1b82c57c861312f1fe130cc5e21c96

  • SHA256

    753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd

  • SHA512

    dd9ab0d96801bdc8e541c60f0cb23f8c5089f8cefd4fa9041dae5d6d7e393f27ff25cc445117e3804f235fabce0fd2ae80d284463ef2278da5afb6a81f285bbb

  • SSDEEP

    49152:SgUFBrKkyuD7ug6e1NsUfgvig28JUU1y4unHZ1IxLRoV:eJK1umgBUU+n28uUMxHXIh6

Malware Config

Extracted

Family

redline

Botnet

150723_rc_11

C2

rcam15.tuktuk.ug:11290

Attributes
  • auth_value

    0b3645317afbcac212f68853bb45b46d

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe
    "C:\Users\Admin\AppData\Local\Temp\753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:2820
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Users\Admin\AppData\Local\Temp\Notepod.exe
          "C:\Users\Admin\AppData\Local\Temp\Notepod.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:1212
          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:3000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

      Filesize

      3.1MB

      MD5

      18658dec7775fa53f081b892d6a2b027

      SHA1

      fa8d901c7aac70e2c37544883ce087e48c6302d1

      SHA256

      17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

      SHA512

      cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

    • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

      Filesize

      3.1MB

      MD5

      18658dec7775fa53f081b892d6a2b027

      SHA1

      fa8d901c7aac70e2c37544883ce087e48c6302d1

      SHA256

      17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

      SHA512

      cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      392.9MB

      MD5

      c25349d954df8f449534e824b0db3100

      SHA1

      2950cf4e68e4791bd7da0cec69ddaf5c57a736ce

      SHA256

      4ddcde89eb85ed3d79bc58b33f0d2cb0953a67266ace2298c674e5d18a9b1690

      SHA512

      cacebcf22a101e1475ebd522e09acff6b30bc86e2041c2f7dcfff4367b9731f01b942185bda80114b20bfd4375a5ae6df8fd7b36189079773bcd0eb0e5c4eb7b

    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      398.4MB

      MD5

      f6226bd76281d074891d80b890a10e4d

      SHA1

      cc96a352fca20ef4cc5590f7587922f3675396cb

      SHA256

      4a5a6cf2d7e154af659bc6d445f7c86c58dba88c11ef692597548eeb10af585c

      SHA512

      27c87ab4c04c39d0bf9d7a7b402010fbc68ab5fde25b525b7283f643285918e86595b880a4bbd83ae88f7a80cbc4ef0dba0127a759d81a7eafbbd9ac18c9229b

    • \Users\Admin\AppData\Local\Temp\Notepod.exe

      Filesize

      3.1MB

      MD5

      18658dec7775fa53f081b892d6a2b027

      SHA1

      fa8d901c7aac70e2c37544883ce087e48c6302d1

      SHA256

      17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

      SHA512

      cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

    • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

      Filesize

      407.4MB

      MD5

      db5c6aeb38aee33c5737584cac57c8a4

      SHA1

      daf01f8d0ec524bf788654bac021a2274dceda25

      SHA256

      defbc93b5df07a18e11be774282dd654b2c116c74369298c3c7ad6f326c3bb4d

      SHA512

      eccc8da8f6930846a401db298cbe8d7268d8f19d6cde5a710a5f445748899290e327e5f4edd1228d766d43520fe14318d427fe2487fb2007dd7224360fe09289

    • memory/1212-144-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-125-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-126-0x00000000776D0000-0x0000000077879000-memory.dmp

      Filesize

      1.7MB

    • memory/1212-148-0x00000000776D0000-0x0000000077879000-memory.dmp

      Filesize

      1.7MB

    • memory/1212-146-0x00000000776D0000-0x0000000077879000-memory.dmp

      Filesize

      1.7MB

    • memory/1212-145-0x0000000028530000-0x0000000028CB5000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-142-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-138-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-136-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-135-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-134-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-133-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-132-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-131-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-130-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-129-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/1212-128-0x00000000001D0000-0x0000000000955000-memory.dmp

      Filesize

      7.5MB

    • memory/2564-95-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-77-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-93-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-91-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-61-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-64-0x00000000778C0000-0x00000000778C2000-memory.dmp

      Filesize

      8KB

    • memory/2564-62-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-66-0x0000000000080000-0x000000000063A000-memory.dmp

      Filesize

      5.7MB

    • memory/2564-54-0x0000000000080000-0x000000000063A000-memory.dmp

      Filesize

      5.7MB

    • memory/2564-67-0x0000000000080000-0x000000000063A000-memory.dmp

      Filesize

      5.7MB

    • memory/2564-55-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-68-0x00000000770D0000-0x0000000077117000-memory.dmp

      Filesize

      284KB

    • memory/2564-89-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-111-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-113-0x00000000770D0000-0x0000000077117000-memory.dmp

      Filesize

      284KB

    • memory/2564-112-0x0000000000080000-0x000000000063A000-memory.dmp

      Filesize

      5.7MB

    • memory/2564-56-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-87-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-57-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-70-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-58-0x00000000770D0000-0x0000000077117000-memory.dmp

      Filesize

      284KB

    • memory/2564-60-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-59-0x0000000076680000-0x0000000076790000-memory.dmp

      Filesize

      1.1MB

    • memory/2564-71-0x0000000000A60000-0x0000000000A7C000-memory.dmp

      Filesize

      112KB

    • memory/2564-72-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-73-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-75-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-85-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-83-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-81-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2564-79-0x0000000000A60000-0x0000000000A75000-memory.dmp

      Filesize

      84KB

    • memory/2836-115-0x0000000074910000-0x0000000074FFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2836-127-0x0000000074910000-0x0000000074FFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2836-96-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2836-107-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2836-98-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2836-118-0x00000000049C0000-0x0000000004A00000-memory.dmp

      Filesize

      256KB

    • memory/2836-117-0x0000000074910000-0x0000000074FFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2836-116-0x00000000049C0000-0x0000000004A00000-memory.dmp

      Filesize

      256KB

    • memory/2836-114-0x0000000000230000-0x0000000000236000-memory.dmp

      Filesize

      24KB

    • memory/2836-110-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2836-105-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2836-104-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2836-100-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2836-102-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2836-124-0x0000000008E80000-0x0000000009605000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-151-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-160-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-147-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-152-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-153-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-154-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-155-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-156-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-157-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-158-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-159-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-150-0x00000000776D0000-0x0000000077879000-memory.dmp

      Filesize

      1.7MB

    • memory/3000-161-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-162-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-163-0x00000000776D0000-0x0000000077879000-memory.dmp

      Filesize

      1.7MB

    • memory/3000-164-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-165-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-166-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-167-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-168-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB

    • memory/3000-169-0x0000000000E20000-0x00000000015A5000-memory.dmp

      Filesize

      7.5MB