Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2023 16:01

General

  • Target

    recoverit_pr_setup.exe

  • Size

    491KB

  • MD5

    af10d0f3f2fa79ba3051c2a96262b065

  • SHA1

    88cf689dc6220a368dc5daaede70ea1fc5ffdb09

  • SHA256

    320bf1b89342b15959fb29c944089d8d6e3c23108cdced1c912b0ea639000ba7

  • SHA512

    4feb7c9f2d25486f5848dcd62e03030af99f0b077d91696a567bb60eed73f87a357896af616c778bf4f12d053b2108c861d54c43b1a8ba1a4ad1784030f8fdab

  • SSDEEP

    6144:eoOL6qi0cPHdUgJVwqbPQkHp8jdbAIcTA3S7j6gk5oTIs5TeUQr:eF2qi9WgJtPfHqRb9mYSn61+ISTfQr

Malware Config

Extracted

Family

laplas

C2

45.159.189.105

Attributes
  • api_key

    b208717c54146010ab89e628591e2a7b11493ef1c593e7b3f15b1c06b1778d59

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\recoverit_pr_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\recoverit_pr_setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\system32\rundll32.exe
      "C:\Users\Admin\AppData\Roaming\vcredist_6c06e4.dll",Options_RunDLL 0900cc00-0140-0448-0e2c-4c55ae341b6e
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:964
  • C:\Users\Admin\AppData\Local\Temp\5EB4.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\5EB4.tmp.exe"
    1⤵
    • Executes dropped EXE
    PID:824
  • C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\system32\choice.exe
        choice /C Y /N /D Y /T 0
        3⤵
          PID:1960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5EB4.tmp.exe

      Filesize

      3.8MB

      MD5

      f0754f63e24b034efb7005438d01eff5

      SHA1

      bdef226c5feb1d958a4e6c7235390b3ea41a4ae9

      SHA256

      ecbe37472148c79ed02a8f5e419e869e6fe24ca5caccdf22c5a1fa798e624d1e

      SHA512

      08070fc24e85b091863708bb46d9fb1229f19627c59fbd8a40f05e5b209ca651d6568464b7ceec54801f85fbc7e3a367bcc4b3cfaff4510f2a521b6239527605

    • C:\Users\Admin\AppData\Local\Temp\5EB4.tmp.exe

      Filesize

      3.8MB

      MD5

      f0754f63e24b034efb7005438d01eff5

      SHA1

      bdef226c5feb1d958a4e6c7235390b3ea41a4ae9

      SHA256

      ecbe37472148c79ed02a8f5e419e869e6fe24ca5caccdf22c5a1fa798e624d1e

      SHA512

      08070fc24e85b091863708bb46d9fb1229f19627c59fbd8a40f05e5b209ca651d6568464b7ceec54801f85fbc7e3a367bcc4b3cfaff4510f2a521b6239527605

    • C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe

      Filesize

      7.4MB

      MD5

      08b674674a2c3ff6fb05ed714e1ece69

      SHA1

      3f8cac6efae08b132f234ae8ecaa13954254c2eb

      SHA256

      95034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071

      SHA512

      7d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f

    • C:\Users\Admin\AppData\Local\Temp\673D.tmp.exe

      Filesize

      7.4MB

      MD5

      08b674674a2c3ff6fb05ed714e1ece69

      SHA1

      3f8cac6efae08b132f234ae8ecaa13954254c2eb

      SHA256

      95034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071

      SHA512

      7d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f

    • C:\Users\Admin\AppData\Roaming\vcredist_6c06e4.dll

      Filesize

      53KB

      MD5

      82888955f9dd51088f355d550e0f957b

      SHA1

      2ca31d77cc2b96ba6bdd61473237114932af3d11

      SHA256

      318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef

      SHA512

      212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed

    • \Users\Admin\AppData\Local\Temp\673D.tmp.exe

      Filesize

      7.4MB

      MD5

      08b674674a2c3ff6fb05ed714e1ece69

      SHA1

      3f8cac6efae08b132f234ae8ecaa13954254c2eb

      SHA256

      95034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071

      SHA512

      7d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f

    • \Users\Admin\AppData\Local\Temp\673D.tmp.exe

      Filesize

      7.4MB

      MD5

      08b674674a2c3ff6fb05ed714e1ece69

      SHA1

      3f8cac6efae08b132f234ae8ecaa13954254c2eb

      SHA256

      95034a3d066ea9924878a1f390f6898aac3cf7ac1dd8e92caf0be076ba00a071

      SHA512

      7d9f3aecc6c36f9c77abd5a0a83437c26ef60b63d6326d411f5d35bab1f011749fe8dd87706bb69a85b2a9c96baca6a256cb533d024b218c70ffab79409d9b2f

    • \Users\Admin\AppData\Roaming\vcredist_6c06e4.dll

      Filesize

      53KB

      MD5

      82888955f9dd51088f355d550e0f957b

      SHA1

      2ca31d77cc2b96ba6bdd61473237114932af3d11

      SHA256

      318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef

      SHA512

      212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed

    • \Users\Admin\AppData\Roaming\vcredist_6c06e4.dll

      Filesize

      53KB

      MD5

      82888955f9dd51088f355d550e0f957b

      SHA1

      2ca31d77cc2b96ba6bdd61473237114932af3d11

      SHA256

      318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef

      SHA512

      212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed

    • \Users\Admin\AppData\Roaming\vcredist_6c06e4.dll

      Filesize

      53KB

      MD5

      82888955f9dd51088f355d550e0f957b

      SHA1

      2ca31d77cc2b96ba6bdd61473237114932af3d11

      SHA256

      318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef

      SHA512

      212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed

    • \Users\Admin\AppData\Roaming\vcredist_6c06e4.dll

      Filesize

      53KB

      MD5

      82888955f9dd51088f355d550e0f957b

      SHA1

      2ca31d77cc2b96ba6bdd61473237114932af3d11

      SHA256

      318c0ea9b4349a1d4c98322341aacf1c96008727ef045ababf8b77241604caef

      SHA512

      212a25e69eefd8e82ebed5a22529a4455f807cbf5bc6ed51ebc5299ee9db3724200170d40b60a84006fb55466d139306b287986a865a1a8c22af27ef3992aeed

    • memory/964-71-0x000007FFFFEB0000-0x000007FFFFFAA000-memory.dmp

      Filesize

      1000KB

    • memory/964-66-0x000007FFFFEB0000-0x000007FFFFFAA000-memory.dmp

      Filesize

      1000KB

    • memory/964-81-0x000007FEF6FE0000-0x000007FEF6FF2000-memory.dmp

      Filesize

      72KB

    • memory/964-80-0x000007FFFFEB0000-0x000007FFFFFAA000-memory.dmp

      Filesize

      1000KB

    • memory/964-65-0x0000000000190000-0x0000000000197000-memory.dmp

      Filesize

      28KB

    • memory/988-69-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/988-54-0x0000000075021000-0x0000000075023000-memory.dmp

      Filesize

      8KB

    • memory/988-70-0x000000000065D000-0x0000000000678000-memory.dmp

      Filesize

      108KB

    • memory/988-58-0x000000000065D000-0x0000000000678000-memory.dmp

      Filesize

      108KB

    • memory/988-57-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/988-56-0x0000000000230000-0x00000000002C0000-memory.dmp

      Filesize

      576KB

    • memory/988-55-0x0000000000630000-0x000000000065B000-memory.dmp

      Filesize

      172KB

    • memory/988-68-0x0000000000230000-0x000000000023D000-memory.dmp

      Filesize

      52KB

    • memory/988-67-0x0000000000630000-0x000000000065B000-memory.dmp

      Filesize

      172KB