Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
Laplas.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Laplas.exe
Resource
win10v2004-20230703-en
General
-
Target
Laplas.exe
-
Size
304KB
-
MD5
ef09a423538646180f81162b69b68b20
-
SHA1
2d38561b4cd4c89419ef0bc5c1ac9234e9136c81
-
SHA256
a145874aa2d3cc607144208ab4fd69f4c91e9400d14d42344a2a49e947980eb5
-
SHA512
cca2314c3496ba36555f4ce70d38c4c3e6be37446ef34687ce84633cbec16d3e3d089a67e2be1086b35d5a0e1f5cfb37d9508b6a3c6849c03e87ade8dcece409
-
SSDEEP
6144:5sSQUg5ecl9ECmIWPWP9pnNDn4ClxGBXrzOBCdOqQh9i2lpWGLM1IOq:Xoee9ECUPWPH2CHG1WCdI9iQpZM14
Malware Config
Extracted
redline
NN
82.115.223.91:82
-
auth_value
1353d61efcc5200a0225ebbc1f97dd2f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 15 4640 powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4640 set thread context of 4016 4640 powershell.exe 89 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4640 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2424 wrote to memory of 4640 2424 Laplas.exe 82 PID 2424 wrote to memory of 4640 2424 Laplas.exe 82 PID 2424 wrote to memory of 4640 2424 Laplas.exe 82 PID 4640 wrote to memory of 4016 4640 powershell.exe 89 PID 4640 wrote to memory of 4016 4640 powershell.exe 89 PID 4640 wrote to memory of 4016 4640 powershell.exe 89 PID 4640 wrote to memory of 4016 4640 powershell.exe 89 PID 4640 wrote to memory of 4016 4640 powershell.exe 89 PID 4640 wrote to memory of 4016 4640 powershell.exe 89 PID 4640 wrote to memory of 4016 4640 powershell.exe 89 PID 4640 wrote to memory of 4016 4640 powershell.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Laplas.exe"C:\Users\Admin\AppData\Local\Temp\Laplas.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\Laplas.exeC:\Users\Admin\AppData\Local\Temp\Laplas.exe3⤵PID:4016
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82