Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2023, 14:34

General

  • Target

    vawax.exe

  • Size

    726.0MB

  • MD5

    c3a17b0e7d83d4eff77f17b5ce764e14

  • SHA1

    accbe20f2588372910baac8636d60719d7a6b56f

  • SHA256

    2dd1f46406e90b8b57ac49bdba45e4f279db5604921df3921f945e72c28d6820

  • SHA512

    86334bf19f9179d440e68bbf8ab4fd11ee45bd6015f8d6842cf87c0e98086528adc8da033bcca39c7f4fed76f18e4dcb4e68820745158580681e1e9b47c1e7bd

  • SSDEEP

    196608:FVi+d3U/4jzIVa48fwWTL7oO30d/3qMbElQ:rP6qzIVa4uwWTX+fqMbT

Malware Config

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vawax.exe
    "C:\Users\Admin\AppData\Local\Temp\vawax.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
      "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    578.2MB

    MD5

    0784ef9fa883a31c41875e49c1127b92

    SHA1

    fda7cf09671dd27f8a60cbe557e601519c7dce84

    SHA256

    5827282891cd1a0e358565b1db2ef0d2580fe0bc9f652c8ecde17830900735a6

    SHA512

    3be0aa19e7c3fb460aaeec9041ae1afdf5139bb34bdf8901bf69b8ff91bc6115bcec03696fe08ebffbf0ab3c45d12e80e6799212367a6224b9b197153a652f7b

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    531.6MB

    MD5

    5c9712eb4937acf26f4f454818f40f22

    SHA1

    00115f47ec1fdab81b680efa5be0d46e896bb5a0

    SHA256

    541e5e872a0141b4ba3a965533fc1ca119cfbed07360cf3417862557a433e16c

    SHA512

    3143ea75821a307b5cb56c143036e35556593999fc3cb5b92f402ff189c71e92262a82018a7e87f73dedbc34fb1f0d71ec7069773c977ef6f96b7262dac28d90

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    503.4MB

    MD5

    705cfd1fe7e50b0efb4876340ab1e534

    SHA1

    b5c41d1f581fa2e5af584a4867b1e736f3651a39

    SHA256

    a9590bc1627e83251f5cbd9ba93f34b2e14d9b53db60a27e12521ce01aac9114

    SHA512

    eff857374149a45af32a0d9540d4db7632408b22815938abba3d5f2f8d94252ddb838aca5e5322551e08f12b514bbbf1e58c0ea43574d63a77a58a0b24179fa3

  • memory/1684-148-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

    Filesize

    4KB

  • memory/1684-149-0x0000000000400000-0x0000000000D45000-memory.dmp

    Filesize

    9.3MB

  • memory/2408-133-0x0000000000E20000-0x0000000000E21000-memory.dmp

    Filesize

    4KB

  • memory/2408-134-0x0000000000400000-0x0000000000D45000-memory.dmp

    Filesize

    9.3MB