Analysis

  • max time kernel
    144s
  • max time network
    128s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-03-2023 20:42

General

  • Target

    559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe

  • Size

    292KB

  • MD5

    5eed4c197a3f3830e36728e36fe0d63a

  • SHA1

    c672bac7f861a93ce84652080b6d75acdc7f75ee

  • SHA256

    559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e

  • SHA512

    9ad56004de4cba6f574393373da00cf5748434f5a4e50f6ef5cde98b83cf6172cd61cd415ed1f4876136ed52587b091146185dfc913a8bfc53358eccbecaed59

  • SSDEEP

    3072:MnBIggLi5GMPpdeEsCW0MGxoMjZ++Py5Rt4OvzhG6/SzBZog5E5tBlrH:lggLiYMPvTNMcoM9o4OvNFukNRlrH

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe
    "C:\Users\Admin\AppData\Local\Temp\559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe
        "C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4512
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Executes dropped EXE
          PID:4828
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\559a8e3272d3e78dc6f9c1dc746fae1de448e1846d8beffffcb6e874059f888e.exe" & del "C:\ProgramData\*.dll"" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:1560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\mozglue.dll

    Filesize

    593KB

    MD5

    c8fd9be83bc728cc04beffafc2907fe9

    SHA1

    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

    SHA256

    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

    SHA512

    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

  • C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe

    Filesize

    1.9MB

    MD5

    3a91b7ba77d714f9a9cd4a351b5965f0

    SHA1

    1c35a08edffae00dfe6592b30f35aa1a2c3da5c5

    SHA256

    d0033b63960e146dbb9f2ae189a8acafd945a646f624b84148030827c18c6d06

    SHA512

    92d14ff13e4c4befd664d8065403954c651841ccfda724118ff38fa89783a88eb9e30825ba4ca548478de526f9a77ed7279333c894f1e9d9f4bf39fd173af29b

  • C:\Users\Admin\AppData\Local\Temp\ECBGIEHDBA.exe

    Filesize

    1.9MB

    MD5

    3a91b7ba77d714f9a9cd4a351b5965f0

    SHA1

    1c35a08edffae00dfe6592b30f35aa1a2c3da5c5

    SHA256

    d0033b63960e146dbb9f2ae189a8acafd945a646f624b84148030827c18c6d06

    SHA512

    92d14ff13e4c4befd664d8065403954c651841ccfda724118ff38fa89783a88eb9e30825ba4ca548478de526f9a77ed7279333c894f1e9d9f4bf39fd173af29b

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    571.5MB

    MD5

    8f214769044c771040bddbf4811028e6

    SHA1

    d32adb344d99e4f2a15a23e2afbe52bd5729429d

    SHA256

    e80f74350fe64ec5b9423b8ed7323d24332d473c22a599b5d951e3d507bde5d3

    SHA512

    54e976613e788ecd5fac31f6b944890550c2e2d8cf55723ff23e6717364a1cd9b10e1e4c57d7a90f8b2292a3c206439a8bc32039fb19d1bdbd20831064465a91

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    481.9MB

    MD5

    b9fbd5e51815f7615ba05d297fe75ae3

    SHA1

    d41efcb427c1a224404b6b972c70f57e52f98c6a

    SHA256

    5d1226a5d8f3ecabc46296f1e2bc0b316162e885f9968c335521aae8e7882942

    SHA512

    dda128e6e544ce41a1d0feef254783f6c0c1c26d84054dd9d7ec929b9b38e6e8ea9a7d05decd7e0eeccde7179276ba7e832ab300b94777ddff36230648057ff8

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    506.1MB

    MD5

    d823e49fde1cf33f31544c9749e05953

    SHA1

    635401b33f1bbd6896200f2a829b9d8cf6c5a556

    SHA256

    b100ecf1b0a69ca1a93563ddda0857d7af98ac86714c37c9916ec6cec1244288

    SHA512

    e91baa0e3371c852f99cad2e3f4861291de50c6f8b559fd6949a4db74f321a93e4d02bccb138424ff82c510a2da2e1fd7493765c019686e251814be15be2f534

  • \ProgramData\mozglue.dll

    Filesize

    593KB

    MD5

    c8fd9be83bc728cc04beffafc2907fe9

    SHA1

    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

    SHA256

    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

    SHA512

    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

  • \ProgramData\nss3.dll

    Filesize

    2.0MB

    MD5

    1cc453cdf74f31e4d913ff9c10acdde2

    SHA1

    6e85eae544d6e965f15fa5c39700fa7202f3aafe

    SHA256

    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

    SHA512

    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

  • memory/2112-119-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/2112-191-0x0000000000400000-0x0000000002AF9000-memory.dmp

    Filesize

    39.0MB

  • memory/2112-118-0x0000000002C60000-0x0000000002C75000-memory.dmp

    Filesize

    84KB

  • memory/4512-202-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4512-196-0x0000000004CE0000-0x00000000050B0000-memory.dmp

    Filesize

    3.8MB

  • memory/4828-209-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-204-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-205-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-207-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-208-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-203-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-210-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-211-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-212-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-213-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-214-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-215-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB

  • memory/4828-216-0x0000000000400000-0x0000000002C8D000-memory.dmp

    Filesize

    40.6MB