Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2023 01:19

General

  • Target

    1ed33d760f151b33b3d20bf9e6d0b722fe39cbd302ecebb5c6e3d0ee09e4ee05.exe

  • Size

    2.8MB

  • MD5

    6659f84db9582049c250a8343dbf9168

  • SHA1

    e58b0d6a289be0a12f20587cf8945233a086a27e

  • SHA256

    1ed33d760f151b33b3d20bf9e6d0b722fe39cbd302ecebb5c6e3d0ee09e4ee05

  • SHA512

    f9c54bd609dd78d182652892747b22db4064401dc420677f0f79e93b8504b6b4a1c92dd08d32cd4362b9973a9f7dc577b753b15f0d543b9449f64d41d652607c

  • SSDEEP

    49152:4K9pTJqY0xorwlsQRXh9e3rcpadXRZCq3PPK5/AQEiNT18Nnb+vE:4KLvZrAjX/rdlpLk+8

Malware Config

Extracted

Family

redline

Botnet

250723_rc_11

C2

rcam25.tuktuk.ug:11290

Attributes
  • auth_value

    e4d5022e8271228547a5ac6b68c29a07

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ed33d760f151b33b3d20bf9e6d0b722fe39cbd302ecebb5c6e3d0ee09e4ee05.exe
    "C:\Users\Admin\AppData\Local\Temp\1ed33d760f151b33b3d20bf9e6d0b722fe39cbd302ecebb5c6e3d0ee09e4ee05.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Users\Admin\AppData\Local\Temp\Notepod.exe
        "C:\Users\Admin\AppData\Local\Temp\Notepod.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    3.1MB

    MD5

    18658dec7775fa53f081b892d6a2b027

    SHA1

    fa8d901c7aac70e2c37544883ce087e48c6302d1

    SHA256

    17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

    SHA512

    cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    3.1MB

    MD5

    18658dec7775fa53f081b892d6a2b027

    SHA1

    fa8d901c7aac70e2c37544883ce087e48c6302d1

    SHA256

    17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

    SHA512

    cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    3.1MB

    MD5

    18658dec7775fa53f081b892d6a2b027

    SHA1

    fa8d901c7aac70e2c37544883ce087e48c6302d1

    SHA256

    17ca2de661fa07dd83a55a5005c61eb8aee1e9cab56e9a13bc36a27f4b785554

    SHA512

    cae5c6041b22b507ce66cb3b6509ff692b359748791aa93e006e1a700ff3cd439314823d070ff869ca4aac8fb8c2ac41d8de134bd1802693833b6cec7464f56d

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    663.0MB

    MD5

    c204e4a125c82174a9640979625855f5

    SHA1

    952d1a895d3a626e2a58be090aa9a804e994f5ad

    SHA256

    3ca1f895d6b7bdcd20effca1a2fe05822319813c07b6014cc7c95803ea7f87cf

    SHA512

    aabda459a8ed48ae5580dd3d34b8bb0086a418fb104fef602c086e3910d739422ec44eea22df5e36f07ee84e3697aeaffb706e01ea3de7cab5c8ed4191a4ec8b

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    670.9MB

    MD5

    7ba446f3be88d83446763d286930f5cc

    SHA1

    1aa6e0bfdc1d452db6a8c41775f216799f82295e

    SHA256

    7edb8c0812a6521deeb02c00bbb3ad0e586274445372f5c9a7beabbfa3f0a161

    SHA512

    f341451d5041fdc6c5fa2a4545f21f07d8c360aea9933387a9a5bce24d641ae3bbd7576a1d29ec66ea35b5973e2c0b8045784933277bb9454e1fa38cc24dea75

  • memory/1108-216-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-214-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-219-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-218-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-217-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-222-0x00007FFDA5D50000-0x00007FFDA5F45000-memory.dmp

    Filesize

    2.0MB

  • memory/1108-215-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-221-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-213-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-212-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-211-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-210-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-209-0x00007FFDA5D50000-0x00007FFDA5F45000-memory.dmp

    Filesize

    2.0MB

  • memory/1108-225-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/1108-228-0x00007FFDA5D50000-0x00007FFDA5F45000-memory.dmp

    Filesize

    2.0MB

  • memory/1108-206-0x0000000000BF0000-0x0000000001375000-memory.dmp

    Filesize

    7.5MB

  • memory/2400-208-0x0000000074930000-0x00000000750E0000-memory.dmp

    Filesize

    7.7MB

  • memory/2400-187-0x000000000A160000-0x000000000A1D6000-memory.dmp

    Filesize

    472KB

  • memory/2400-194-0x000000000CB90000-0x000000000D0BC000-memory.dmp

    Filesize

    5.2MB

  • memory/2400-193-0x000000000C490000-0x000000000C652000-memory.dmp

    Filesize

    1.8MB

  • memory/2400-192-0x0000000004980000-0x0000000004990000-memory.dmp

    Filesize

    64KB

  • memory/2400-191-0x0000000074930000-0x00000000750E0000-memory.dmp

    Filesize

    7.7MB

  • memory/2400-190-0x000000000AA50000-0x000000000AAB6000-memory.dmp

    Filesize

    408KB

  • memory/2400-176-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2400-179-0x0000000074930000-0x00000000750E0000-memory.dmp

    Filesize

    7.7MB

  • memory/2400-189-0x000000000B000000-0x000000000B5A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2400-188-0x000000000A280000-0x000000000A312000-memory.dmp

    Filesize

    584KB

  • memory/2400-182-0x000000000A430000-0x000000000AA48000-memory.dmp

    Filesize

    6.1MB

  • memory/2400-183-0x0000000009F20000-0x000000000A02A000-memory.dmp

    Filesize

    1.0MB

  • memory/2400-184-0x0000000004940000-0x0000000004952000-memory.dmp

    Filesize

    72KB

  • memory/2400-185-0x0000000004980000-0x0000000004990000-memory.dmp

    Filesize

    64KB

  • memory/2400-186-0x0000000009E50000-0x0000000009E8C000-memory.dmp

    Filesize

    240KB

  • memory/2824-167-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-136-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-180-0x0000000000AF0000-0x00000000011A2000-memory.dmp

    Filesize

    6.7MB

  • memory/2824-175-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-173-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-171-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-169-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-133-0x0000000000AF0000-0x00000000011A2000-memory.dmp

    Filesize

    6.7MB

  • memory/2824-165-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-163-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-161-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-159-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-157-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-155-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-153-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-152-0x0000000002E10000-0x0000000002E25000-memory.dmp

    Filesize

    84KB

  • memory/2824-151-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-149-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-148-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-147-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-146-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-145-0x0000000000AF0000-0x00000000011A2000-memory.dmp

    Filesize

    6.7MB

  • memory/2824-144-0x0000000005260000-0x00000000052FC000-memory.dmp

    Filesize

    624KB

  • memory/2824-143-0x0000000000AF0000-0x00000000011A2000-memory.dmp

    Filesize

    6.7MB

  • memory/2824-139-0x0000000077444000-0x0000000077446000-memory.dmp

    Filesize

    8KB

  • memory/2824-138-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-137-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-181-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-134-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/2824-135-0x0000000076130000-0x0000000076220000-memory.dmp

    Filesize

    960KB

  • memory/3588-240-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-232-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-227-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-231-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-241-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-233-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-234-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-242-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-236-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-237-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-238-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-239-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-230-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-229-0x00007FFDA5D50000-0x00007FFDA5F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3588-235-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-243-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-244-0x00007FFDA5D50000-0x00007FFDA5F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3588-245-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-246-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-248-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-249-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-250-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-251-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-252-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB

  • memory/3588-253-0x0000000000E90000-0x0000000001615000-memory.dmp

    Filesize

    7.5MB