Analysis

  • max time kernel
    112s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2023 20:31

General

  • Target

    tmp.exe

  • Size

    7.3MB

  • MD5

    99f16ab6ab670935b5aa5c84b1b5f6bd

  • SHA1

    59f375481cdfe246d1ddcaada9941e16dcfda297

  • SHA256

    348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057

  • SHA512

    845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70

  • SSDEEP

    196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1

Malware Config

Extracted

Family

laplas

C2

http://185.106.92.104

Attributes
  • api_key

    bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
      "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    707.3MB

    MD5

    d8345839286d65413aa8283a9ea60ab8

    SHA1

    ae51e3b519985ad97b5e909fb525fb817ebafeb2

    SHA256

    8861e2370d607a6fed36c58dd87fd69b34e488b3a13dc8a900fc50fb62e5bce9

    SHA512

    9a3b6318cc662e5f462797c87bebb5648f90229861313fcf564af692ed516e046918a2d933c0a19cf31bea4d57f76f9a447b8595827b615366b68a3778698448

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    707.3MB

    MD5

    d8345839286d65413aa8283a9ea60ab8

    SHA1

    ae51e3b519985ad97b5e909fb525fb817ebafeb2

    SHA256

    8861e2370d607a6fed36c58dd87fd69b34e488b3a13dc8a900fc50fb62e5bce9

    SHA512

    9a3b6318cc662e5f462797c87bebb5648f90229861313fcf564af692ed516e046918a2d933c0a19cf31bea4d57f76f9a447b8595827b615366b68a3778698448

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    707.3MB

    MD5

    d8345839286d65413aa8283a9ea60ab8

    SHA1

    ae51e3b519985ad97b5e909fb525fb817ebafeb2

    SHA256

    8861e2370d607a6fed36c58dd87fd69b34e488b3a13dc8a900fc50fb62e5bce9

    SHA512

    9a3b6318cc662e5f462797c87bebb5648f90229861313fcf564af692ed516e046918a2d933c0a19cf31bea4d57f76f9a447b8595827b615366b68a3778698448

  • memory/2352-138-0x0000000003070000-0x0000000003071000-memory.dmp

    Filesize

    4KB

  • memory/2352-137-0x0000000003060000-0x0000000003061000-memory.dmp

    Filesize

    4KB

  • memory/2352-133-0x0000000001350000-0x0000000001351000-memory.dmp

    Filesize

    4KB

  • memory/2352-139-0x0000000003080000-0x0000000003081000-memory.dmp

    Filesize

    4KB

  • memory/2352-140-0x0000000003090000-0x0000000003091000-memory.dmp

    Filesize

    4KB

  • memory/2352-141-0x0000000000290000-0x0000000000E0B000-memory.dmp

    Filesize

    11.5MB

  • memory/2352-136-0x0000000003050000-0x0000000003051000-memory.dmp

    Filesize

    4KB

  • memory/2352-135-0x0000000003030000-0x0000000003031000-memory.dmp

    Filesize

    4KB

  • memory/2352-134-0x00000000013B0000-0x00000000013B1000-memory.dmp

    Filesize

    4KB

  • memory/4392-155-0x00000000030E0000-0x00000000030E1000-memory.dmp

    Filesize

    4KB

  • memory/4392-156-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/4392-158-0x0000000003120000-0x0000000003121000-memory.dmp

    Filesize

    4KB

  • memory/4392-160-0x0000000003140000-0x0000000003141000-memory.dmp

    Filesize

    4KB

  • memory/4392-157-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/4392-159-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/4392-161-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/4392-162-0x0000000003270000-0x0000000003271000-memory.dmp

    Filesize

    4KB

  • memory/4392-163-0x0000000000570000-0x00000000010EB000-memory.dmp

    Filesize

    11.5MB