Analysis

  • max time kernel
    132s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2023, 11:57

General

  • Target

    setup.exe

  • Size

    1.8MB

  • MD5

    94ce1cdbccb31d0993990d8a5fbd34d8

  • SHA1

    392bb3736fe7b5e45f808f69097ae422ebc5c018

  • SHA256

    9fd8f6b9da8e8e845e6df797bf107adaae3a5cb45ce45819c18fdbfbaf3f76a5

  • SHA512

    2525b7ac471490b61ab425c81c85956de1ff8d2a97787e95341bbd0f2047521183533495005eeefc427a30ec979e36421533696ecb7dadade57c13881294d7ab

  • SSDEEP

    49152:rzmvpQccgreskIaAUgrqgHkrWIF994X5IBYr:rzOJtqgHkVoIB

Malware Config

Extracted

Family

laplas

C2

http://45.87.154.105

Attributes
  • api_key

    1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1944

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          190.2MB

          MD5

          124931bc8f14a8078d6ccd05e1d62928

          SHA1

          d2546f4364e78e4aa1914a09680943ded3a1d918

          SHA256

          8f235f0fc991f26259b48231cd15405a1e77c6e189f13ae4d51d36517be67352

          SHA512

          34b6c22b7b5e877de2a7e53fe4a9bf5c2afd65bf5b17ae56fbee4b61fe5c717f605930e845660f4dc466e795d982fdfc757e1e9ac1c4d55069ac11075c936530

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          187.2MB

          MD5

          6fe678853fee8ad303f21d49157d7387

          SHA1

          320902f4434b0e458f3f22f213c87654a2c05f57

          SHA256

          35e47701ed0e716d1b9b13ea3797d000627f74e918a12f401fe05230ad32289f

          SHA512

          334dc9c7ee7f932ffa9cfae0bfe021439460a715ce3239c116f8e308083a2b338a3839e74a30e5e6d86e8c2961d381ffde936186d56ce5b54192e3eb91a6f800

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          172.3MB

          MD5

          ec14f82ab62b28923dc09e8bbe9fc1c7

          SHA1

          cd9b8aa780354dc82b5e0cffb35f961ea61708cd

          SHA256

          6b948345e7d2c09087d49480ffed3e197fff88d7673fdebbc1c70958f6d01f3e

          SHA512

          ab3b0a3c0935a2888cd5f39354ee57755b37f7b72732f17c1ffe43fef89094c06e2eb03685bdf4c74505d670898292299cac50d7ea11acb391de085b1ed1013c

        • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          111.1MB

          MD5

          4dde8126c8e2b01fe8d0a28673a8c6c0

          SHA1

          2b6e859aff298d86c880866988804a735a6436e8

          SHA256

          ac0c655843c4429f9711e8bfe819888b0f4b642655d77d308acd3b55479c744c

          SHA512

          e88b21a1645d070c3908cefbbfbe85743fbb2a7b46b070c798ddba47919b7e09dfb009f8538a64541a5da9b150c610df7debcfc590b719b52ee54e029d160816

        • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          189.8MB

          MD5

          c711feff96aef2966145de74f89fda68

          SHA1

          ee9750e4439741d110c3603d06ae89af420fd1ac

          SHA256

          ab23476a1507b7cf50a48d753796672628beaada201f647c1509ad6cf47f8554

          SHA512

          14cc0373642c6c46e19b4f98ed3235a63cdd2d88ed8deda30ca8b42102b4b8e017854960a6f25fced526433210dd8c13cdc9eb77e021e59dbd3b84eacdb7a72b

        • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          191.4MB

          MD5

          cbef66589b3e3a906f6dba3dfd909604

          SHA1

          37caa85c8fe0fd451c9ff6881fc3ccff50edcaf7

          SHA256

          23413ab88639a9ed1b3cbb35eaf87f9414ae8297e60f3b962fe490ca2773f2d5

          SHA512

          9b9ec9d7157038567dc5a3946f86685ad920f76f79bb75312883d02a688f0c04f8b8f463a1bcdb0ebc798e6bb942b9282c7de90e1cf89ee45d760cfe63525805

        • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          178.0MB

          MD5

          f9f7962eb8dad9fdb71ccfc8c3a4cca5

          SHA1

          9753e7de29c392d136845987a175cb0701a18fa1

          SHA256

          9f88fd2007638ae619806b01328ada6437f0edde5536732953e3d1c527fab80c

          SHA512

          ef9e6c5d79cfe4b3adcf56ff32aa7b7c442ffebb0030f7ae0ff71827f379f1660fad0581d548abe2989c66d54285e5e8507e3a856f2bb2e71acec59f2fbeb53c

        • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          189.3MB

          MD5

          df37fcbb49f2a92fe26b50fec8b46eff

          SHA1

          372b7d246a5965f9ed8cb5778b905ba1b9e66c8b

          SHA256

          397c8b771511f652eb8a5c9282bd699664d4abbe350df2002fbab50ef722c17f

          SHA512

          90e929bd475d8e6d27c1462290cb44b13d3af00bdca694ad8b93ea3d5c200ebf58a27c306a4a9ecddf5e5f5a7cbb40c7c8d91c1c29903d27ef79e7ec1f6c1e70

        • memory/1944-71-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-79-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-84-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-83-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-82-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-72-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-73-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-76-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-77-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-78-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-69-0x00000000047D0000-0x000000000497A000-memory.dmp

          Filesize

          1.7MB

        • memory/1944-80-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1944-81-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1960-54-0x00000000048E0000-0x0000000004A8A000-memory.dmp

          Filesize

          1.7MB

        • memory/1960-65-0x0000000000400000-0x0000000002C88000-memory.dmp

          Filesize

          40.5MB

        • memory/1960-55-0x0000000004A90000-0x0000000004E60000-memory.dmp

          Filesize

          3.8MB