Analysis

  • max time kernel
    147s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2023 14:27

General

  • Target

    223f8d67c784e3f6cc85c721dd718af53510f6884dbc1ea4dd328cc26da03f5eexe_JC.exe

  • Size

    2.8MB

  • MD5

    1d156981b23a1531d4e6449c95ec6c9f

  • SHA1

    98c264b55efdd118215190955d3a6372e4497330

  • SHA256

    223f8d67c784e3f6cc85c721dd718af53510f6884dbc1ea4dd328cc26da03f5e

  • SHA512

    c2cc592a3b4aef17e1a6882f97e36bc3cc257b6c83b21cc72bd92cf45ff48c5de45c22c34352a10bf3fc66a884dfb8fec007781561be88e9071d6a2433f91a2d

  • SSDEEP

    49152:OS6hBcbHH6ORsof+ZymfCvKa+nxzsA/y8aiPRmN6VLvOjwsDxA:OS+BcHaORvmZJfdxIA/y83PcNcLvSwsi

Malware Config

Extracted

Family

redline

Botnet

300723_rc

C2

rc3007.tuktuk.ug:11290

Attributes
  • auth_value

    ce139e531e6dc9a5397038679a0625d3

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\223f8d67c784e3f6cc85c721dd718af53510f6884dbc1ea4dd328cc26da03f5eexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\223f8d67c784e3f6cc85c721dd718af53510f6884dbc1ea4dd328cc26da03f5eexe_JC.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Local\Temp\Notepod.exe
        "C:\Users\Admin\AppData\Local\Temp\Notepod.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:3504
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    4.1MB

    MD5

    b30e29bccabab032c27910210d9ccf76

    SHA1

    caa3927738b66c3ecc553943eabedcbbfbe4c0da

    SHA256

    b6e2f26fea81267dc7b39b4f919083c8c8be5ff233a5c3acca6e1339d5bb21e2

    SHA512

    ce8348d0547de624b1bf19804c87b1e0379d29c5fe585d0ac602f51dd1bab90649654b87ebd236eef593829757d182ae16facbd5c2710bfecc87837c63a495a8

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    4.1MB

    MD5

    b30e29bccabab032c27910210d9ccf76

    SHA1

    caa3927738b66c3ecc553943eabedcbbfbe4c0da

    SHA256

    b6e2f26fea81267dc7b39b4f919083c8c8be5ff233a5c3acca6e1339d5bb21e2

    SHA512

    ce8348d0547de624b1bf19804c87b1e0379d29c5fe585d0ac602f51dd1bab90649654b87ebd236eef593829757d182ae16facbd5c2710bfecc87837c63a495a8

  • C:\Users\Admin\AppData\Local\Temp\Notepod.exe

    Filesize

    4.1MB

    MD5

    b30e29bccabab032c27910210d9ccf76

    SHA1

    caa3927738b66c3ecc553943eabedcbbfbe4c0da

    SHA256

    b6e2f26fea81267dc7b39b4f919083c8c8be5ff233a5c3acca6e1339d5bb21e2

    SHA512

    ce8348d0547de624b1bf19804c87b1e0379d29c5fe585d0ac602f51dd1bab90649654b87ebd236eef593829757d182ae16facbd5c2710bfecc87837c63a495a8

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    517.5MB

    MD5

    f7ed847450ee312167ca641281f0e4cf

    SHA1

    ad9761e90de7dfff97f8d5e70484df2bf864898b

    SHA256

    8171aef1dc82403c154ab99c2d95afca44d07f4678c9325b7a47f3efd41b7313

    SHA512

    bfb34cf55f964639f72ee1128885a511286f3a90d258d74b4d0950dde8d432203f256cf7c8fbc97b0be94e412232627401c36e8e43303f14d245649e993cf008

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    513.1MB

    MD5

    1ce984e6c0c12a63475169ceabf793df

    SHA1

    e36605eb6af7648ee20d6a0bb37f0c693b207441

    SHA256

    2951805fc76eaae60fb684933cee28b49b75da9fd3cc5c0a444bea7850108ed4

    SHA512

    fe1f7049cd8b3ca7e66a2641b8244ff113adb1d95d11ba598d24a4c8242c865edd0fad2b184338d7a1b59499f1cd249a1ea0c67ab5a1c29b92586092725ea048

  • memory/856-191-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/856-189-0x000000000B520000-0x000000000BAC4000-memory.dmp

    Filesize

    5.6MB

  • memory/856-194-0x000000000C3A0000-0x000000000C8CC000-memory.dmp

    Filesize

    5.2MB

  • memory/856-193-0x000000000BCA0000-0x000000000BE62000-memory.dmp

    Filesize

    1.8MB

  • memory/856-192-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/856-176-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/856-190-0x000000000A8E0000-0x000000000A946000-memory.dmp

    Filesize

    408KB

  • memory/856-208-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/856-188-0x000000000A840000-0x000000000A8D2000-memory.dmp

    Filesize

    584KB

  • memory/856-187-0x000000000A720000-0x000000000A796000-memory.dmp

    Filesize

    472KB

  • memory/856-186-0x000000000A3F0000-0x000000000A42C000-memory.dmp

    Filesize

    240KB

  • memory/856-185-0x000000000A390000-0x000000000A3A2000-memory.dmp

    Filesize

    72KB

  • memory/856-184-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/856-183-0x000000000A450000-0x000000000A55A000-memory.dmp

    Filesize

    1.0MB

  • memory/856-182-0x000000000A950000-0x000000000AF68000-memory.dmp

    Filesize

    6.1MB

  • memory/856-178-0x0000000074940000-0x00000000750F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-225-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-206-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-228-0x00007FF9203B0000-0x00007FF9205A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3504-222-0x00007FF9203B0000-0x00007FF9205A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3504-221-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-219-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-218-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-217-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-216-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-215-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-214-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-213-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-212-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-211-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-210-0x0000000000420000-0x0000000000CBB000-memory.dmp

    Filesize

    8.6MB

  • memory/3504-209-0x00007FF9203B0000-0x00007FF9205A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3516-234-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-227-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-252-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-251-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-249-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-248-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-247-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-246-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-245-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-244-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-243-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-242-0x00007FF9203B0000-0x00007FF9205A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3516-241-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-240-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-239-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-238-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-236-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-235-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-233-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-232-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-231-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-230-0x0000000000CC0000-0x000000000155B000-memory.dmp

    Filesize

    8.6MB

  • memory/3516-229-0x00007FF9203B0000-0x00007FF9205A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4844-152-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-157-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-169-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-135-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-173-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-133-0x00000000007C0000-0x0000000000E64000-memory.dmp

    Filesize

    6.6MB

  • memory/4844-134-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-167-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-175-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-163-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-161-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-180-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-181-0x00000000007C0000-0x0000000000E64000-memory.dmp

    Filesize

    6.6MB

  • memory/4844-165-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-159-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-171-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-155-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-150-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-153-0x0000000005360000-0x0000000005375000-memory.dmp

    Filesize

    84KB

  • memory/4844-136-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-151-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-137-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-138-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-139-0x0000000077454000-0x0000000077456000-memory.dmp

    Filesize

    8KB

  • memory/4844-143-0x00000000007C0000-0x0000000000E64000-memory.dmp

    Filesize

    6.6MB

  • memory/4844-144-0x00000000053C0000-0x000000000545C000-memory.dmp

    Filesize

    624KB

  • memory/4844-145-0x00000000007C0000-0x0000000000E64000-memory.dmp

    Filesize

    6.6MB

  • memory/4844-147-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-148-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB

  • memory/4844-149-0x0000000076E60000-0x0000000076F50000-memory.dmp

    Filesize

    960KB