Analysis

  • max time kernel
    137s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 08:10

General

  • Target

    223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90.exe

  • Size

    301KB

  • MD5

    3cb930fc50c931ee8d8eb36f9a239fc3

  • SHA1

    dc716aa31de06e05c56718b25a5dda5908963a11

  • SHA256

    223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90

  • SHA512

    e8020f7210d47d4a21bc1d659bfa1f29d875f51ff5264975225b0274520ea83f318498cfbbd5d901cd22dbb80a7bce99a27b1dc3689af994fed9affb25bbb3e0

  • SSDEEP

    3072:PMD/w1LQ/WAY4aJy/vq4oh/JVH7B4RiaNuv/JX580tP+L:Qw1LQeAYbJr4Sp/0uHIw+L

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90.exe
    "C:\Users\Admin\AppData\Local\Temp\223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JJECGCBGDB.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Users\Admin\AppData\Local\Temp\JJECGCBGDB.exe
        "C:\Users\Admin\AppData\Local\Temp\JJECGCBGDB.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Executes dropped EXE
          PID:4024
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 520
          4⤵
          • Program crash
          PID:3892
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\223c077f6eeb0ff32fd5c932f5a4dd311feb4e0156e2d464a6cb9a3645dede90.exe" & del "C:\ProgramData\*.dll"" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:2848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 2168
      2⤵
      • Program crash
      PID:1664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4964 -ip 4964
    1⤵
      PID:4656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3932 -ip 3932
      1⤵
        PID:4416

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • C:\ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • C:\ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • C:\Users\Admin\AppData\Local\Temp\JJECGCBGDB.exe

        Filesize

        1.9MB

        MD5

        e9459c4e90448a2078dded1a0743d268

        SHA1

        86b674b3620b68f6d8148f8bee741611e6d5c0ff

        SHA256

        e78b816c45b724995d96bbfef7eef35189f357836b0b47454e0f6dfd3be06d8d

        SHA512

        f23c95d20fe12d144952864e9e0a4ae8e1e94d7354b62d8403bee2ddbc60aad859597d2ea93ce9a805ddefa58baa5ef0ce512f303e987f1ea3526d70ca6bc0f8

      • C:\Users\Admin\AppData\Local\Temp\JJECGCBGDB.exe

        Filesize

        1.9MB

        MD5

        e9459c4e90448a2078dded1a0743d268

        SHA1

        86b674b3620b68f6d8148f8bee741611e6d5c0ff

        SHA256

        e78b816c45b724995d96bbfef7eef35189f357836b0b47454e0f6dfd3be06d8d

        SHA512

        f23c95d20fe12d144952864e9e0a4ae8e1e94d7354b62d8403bee2ddbc60aad859597d2ea93ce9a805ddefa58baa5ef0ce512f303e987f1ea3526d70ca6bc0f8

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        632.8MB

        MD5

        2d4811ee04f6dacb4a5051305506b850

        SHA1

        2cee50d93584f948d0cdb4345e001dca22f54814

        SHA256

        e1b4da08161188bab50ebe781e35d316ac9aef299f1aef367812eb318db6db15

        SHA512

        205138a2741ac9bc8c0c140428eb732436c9fe60fb8abae7f968ff959a18a855dafc0374eb38c9177fb92dca029e95939e335d94aa5ab6b2d79efc24a9392038

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        544.5MB

        MD5

        9b39f392f2a10e5f9c03b0a051afb0ff

        SHA1

        7f1bf9b9b4da76d33a81a7f665e5b33d8e0300ca

        SHA256

        7d4881523516f5f2e1782da010b8d89d4569f3bcf48c1027dbab3aff1103da1f

        SHA512

        f6ca190f16e43fec1a83789ce6821a4be0ed69bcdc9b53b5ad9211398fb6ffe4e1b328ffd087d2eebea7a5b6c01b1c36e638daf5ba9e3b50d2a847d9202b3672

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        513.8MB

        MD5

        281535b94f4ce19ef408b3355d255526

        SHA1

        601411e158fcc4b2bfa81fe26f4755f0e6eae714

        SHA256

        57ebd9fe91329ca4469ea3ad78c71b20b31925516fb28d5bdfdd3e1a419cd994

        SHA512

        603576b018a41bffd031c155cf1da63e19d0e9a0410b0ccbf14a376e324f21af0041bb6d382d19a5e3644d74bbd6ce82e29f0421f0ae315b58c10e81996193c4

      • memory/3932-221-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/3932-216-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/3932-213-0x0000000004AE0000-0x0000000004EB0000-memory.dmp

        Filesize

        3.8MB

      • memory/4024-230-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-228-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-235-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-222-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-224-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-225-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-226-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-234-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-229-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-233-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-231-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4024-232-0x0000000000400000-0x0000000002C90000-memory.dmp

        Filesize

        40.6MB

      • memory/4964-214-0x0000000000400000-0x0000000002AFB000-memory.dmp

        Filesize

        39.0MB

      • memory/4964-134-0x0000000004720000-0x0000000004735000-memory.dmp

        Filesize

        84KB

      • memory/4964-135-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB