Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2023 13:08

General

  • Target

    NA_1ed33d760f151b33b3d20bf9e_JC.exe

  • Size

    2.8MB

  • MD5

    6659f84db9582049c250a8343dbf9168

  • SHA1

    e58b0d6a289be0a12f20587cf8945233a086a27e

  • SHA256

    1ed33d760f151b33b3d20bf9e6d0b722fe39cbd302ecebb5c6e3d0ee09e4ee05

  • SHA512

    f9c54bd609dd78d182652892747b22db4064401dc420677f0f79e93b8504b6b4a1c92dd08d32cd4362b9973a9f7dc577b753b15f0d543b9449f64d41d652607c

  • SSDEEP

    49152:4K9pTJqY0xorwlsQRXh9e3rcpadXRZCq3PPK5/AQEiNT18Nnb+vE:4KLvZrAjX/rdlpLk+8

Malware Config

Extracted

Family

redline

Botnet

250723_rc_11

C2

rcam25.tuktuk.ug:11290

Attributes
  • auth_value

    e4d5022e8271228547a5ac6b68c29a07

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NA_1ed33d760f151b33b3d20bf9e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NA_1ed33d760f151b33b3d20bf9e_JC.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4320
      • C:\Users\Admin\AppData\Local\Temp\Notepod.exe
        "C:\Users\Admin\AppData\Local\Temp\Notepod.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    3.1MB

    MD5

    18658dec7775fa53f081b892d6a2b027

    SHA1

    fa8d901c7aac70e2c37544883ce087e48c6302d1

    SHA256

    17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

    SHA512

    cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    3.1MB

    MD5

    18658dec7775fa53f081b892d6a2b027

    SHA1

    fa8d901c7aac70e2c37544883ce087e48c6302d1

    SHA256

    17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

    SHA512

    cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    3.1MB

    MD5

    18658dec7775fa53f081b892d6a2b027

    SHA1

    fa8d901c7aac70e2c37544883ce087e48c6302d1

    SHA256

    17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

    SHA512

    cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    663.8MB

    MD5

    9f0befb01d77d751bfb27fd520cbffea

    SHA1

    c49489a5780f9315aefe698f801b78f114e9bd69

    SHA256

    cebc9aef1a03d8b4d6ae39651f5e2d4eabfccaf5d514a0f633bb00ca24e3b3e9

    SHA512

    856132bb5d65583dc92ba15081a7187b50eabda21c598fa6a97ab0f2a83137300777e6da7fc33c4dec15c5420250854b2a6f076fcda706895146ce8ba377550f

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    659.6MB

    MD5

    62b4664f8063c068e052fa5766605dd4

    SHA1

    882236f7263d971659481cf7987d443007389721

    SHA256

    c359022559dde1cce30733ab1940e7fdbfa240e3bc179f4a137668c317066109

    SHA512

    c482cce7fe4cbac458cbf3590544cf83379a3b0818206747958b46db8cbe6ed9cf7a7ecb69b370bd1f77ce6141ee21deae43efa2d574216cf6569d2f5b3f870c

  • memory/2452-228-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-229-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-252-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-251-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-250-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-249-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-247-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-246-0x00007FF90B750000-0x00007FF90B945000-memory.dmp

    Filesize

    2.0MB

  • memory/2452-245-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-244-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-243-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-242-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-241-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-240-0x00007FF90B750000-0x00007FF90B945000-memory.dmp

    Filesize

    2.0MB

  • memory/2452-239-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-238-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-237-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-236-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-235-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-234-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-233-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-231-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2452-230-0x0000000000660000-0x0000000000DE5000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-206-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-227-0x00007FF90B750000-0x00007FF90B945000-memory.dmp

    Filesize

    2.0MB

  • memory/2960-225-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-222-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-221-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-219-0x00007FF90B750000-0x00007FF90B945000-memory.dmp

    Filesize

    2.0MB

  • memory/2960-218-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-217-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-216-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-215-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-214-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-213-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-212-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-211-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-210-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/2960-209-0x0000000000310000-0x0000000000A95000-memory.dmp

    Filesize

    7.5MB

  • memory/3332-135-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-157-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-144-0x0000000000DD0000-0x0000000001482000-memory.dmp

    Filesize

    6.7MB

  • memory/3332-139-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-145-0x00000000053F0000-0x000000000548C000-memory.dmp

    Filesize

    624KB

  • memory/3332-146-0x0000000000DD0000-0x0000000001482000-memory.dmp

    Filesize

    6.7MB

  • memory/3332-147-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-148-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-149-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-150-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-152-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-153-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-155-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-159-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-137-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-161-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-163-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-165-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-136-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-181-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-180-0x0000000000DD0000-0x0000000001482000-memory.dmp

    Filesize

    6.7MB

  • memory/3332-140-0x0000000077174000-0x0000000077176000-memory.dmp

    Filesize

    8KB

  • memory/3332-134-0x0000000000DD0000-0x0000000001482000-memory.dmp

    Filesize

    6.7MB

  • memory/3332-138-0x0000000075480000-0x0000000075570000-memory.dmp

    Filesize

    960KB

  • memory/3332-167-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-175-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-173-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-171-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/3332-169-0x0000000003040000-0x0000000003055000-memory.dmp

    Filesize

    84KB

  • memory/4320-189-0x0000000006EB0000-0x0000000007454000-memory.dmp

    Filesize

    5.6MB

  • memory/4320-187-0x0000000005BB0000-0x0000000005C26000-memory.dmp

    Filesize

    472KB

  • memory/4320-183-0x00000000058E0000-0x00000000059EA000-memory.dmp

    Filesize

    1.0MB

  • memory/4320-184-0x0000000005820000-0x0000000005832000-memory.dmp

    Filesize

    72KB

  • memory/4320-176-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4320-179-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/4320-182-0x0000000005DF0000-0x0000000006408000-memory.dmp

    Filesize

    6.1MB

  • memory/4320-188-0x0000000005CD0000-0x0000000005D62000-memory.dmp

    Filesize

    584KB

  • memory/4320-186-0x0000000005880000-0x00000000058BC000-memory.dmp

    Filesize

    240KB

  • memory/4320-190-0x0000000005D70000-0x0000000005DD6000-memory.dmp

    Filesize

    408KB

  • memory/4320-191-0x0000000006CD0000-0x0000000006E92000-memory.dmp

    Filesize

    1.8MB

  • memory/4320-192-0x0000000009080000-0x00000000095AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4320-193-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/4320-194-0x00000000057C0000-0x00000000057D0000-memory.dmp

    Filesize

    64KB

  • memory/4320-208-0x0000000074660000-0x0000000074E10000-memory.dmp

    Filesize

    7.7MB

  • memory/4320-185-0x00000000057C0000-0x00000000057D0000-memory.dmp

    Filesize

    64KB