Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2023 10:47

General

  • Target

    83224bbf17e2eaad3e40aa076696d35daef0a126d7c7c8125920ff457b4de93d.exe

  • Size

    1.9MB

  • MD5

    27c3e0708804985d4f0758f873509805

  • SHA1

    926ae820a61da9a6241ea94299edfcac963bcf78

  • SHA256

    83224bbf17e2eaad3e40aa076696d35daef0a126d7c7c8125920ff457b4de93d

  • SHA512

    bfca20c53257b54cbd8939bfa3023f3db10e796db0db5a3d445638d3ed73bf79d4510017f2e99470091fb20c615a82ee1d22962770ab053b94947f435aa69966

  • SSDEEP

    49152:RQ7IJR3VJ9Ln5CI3o4U9ekXJkGB0qj5Bl+w:RZJR3VJ9VCAce45BD

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83224bbf17e2eaad3e40aa076696d35daef0a126d7c7c8125920ff457b4de93d.exe
    "C:\Users\Admin\AppData\Local\Temp\83224bbf17e2eaad3e40aa076696d35daef0a126d7c7c8125920ff457b4de93d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:2824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    722.9MB

    MD5

    22d7e20272a4bd7329f331cf2cc28e50

    SHA1

    4d142291aa056e7c07aef4d332e1d8b4de44724c

    SHA256

    ef62c934922294c35f87ee23fb58c44723380ac11b5ba58457de387a5707737c

    SHA512

    6e06e43c62e9fe95eaa373e4601dc2f034071bf3245e225cfbdc1439e500bb1314296bcd6686a5a0b57a64697a221036f19bb121f3cfe09ca8b2514d66a87cc9

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    722.9MB

    MD5

    22d7e20272a4bd7329f331cf2cc28e50

    SHA1

    4d142291aa056e7c07aef4d332e1d8b4de44724c

    SHA256

    ef62c934922294c35f87ee23fb58c44723380ac11b5ba58457de387a5707737c

    SHA512

    6e06e43c62e9fe95eaa373e4601dc2f034071bf3245e225cfbdc1439e500bb1314296bcd6686a5a0b57a64697a221036f19bb121f3cfe09ca8b2514d66a87cc9

  • memory/1388-134-0x0000000004C40000-0x0000000005010000-memory.dmp

    Filesize

    3.8MB

  • memory/1388-138-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-146-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-149-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-143-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-144-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-141-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-147-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-148-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-142-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-150-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-151-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-152-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-153-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-154-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB

  • memory/2824-155-0x0000000000400000-0x0000000002C8F000-memory.dmp

    Filesize

    40.6MB