Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 02:13

General

  • Target

    svchost.exe

  • Size

    1.8MB

  • MD5

    0a935300ad790ad8d03666b1f14e73a4

  • SHA1

    57bf66e15b0cbf325ce66d4c9d5592088a1a8e00

  • SHA256

    9b96d15a412a80fb77e790070084ce815945398f9c9b103ece0ed420850ace12

  • SHA512

    64e7c5e9b0c301a2b4a87dc0189fa55bc7c8690d9148382fd237851348a977376a9772c232f6a898417e92e739add1410d3f143f93547eb99c57fa064ce78096

  • SSDEEP

    49152:HRS3ddTQVvnRdoXwG1a/MrkK9daCBCimRL6E84TB:xSk4XwG1lr0PR8iB

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:3880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    784.8MB

    MD5

    db88024fd3956ee46f8f9d3e40f23155

    SHA1

    7ce8e2194f3a14f75fd270363a476cfe83d8ea52

    SHA256

    d1c6ac6e8e14c0170ac54812d4aed6905e8d7044b9278b637c50ae2d24d0745e

    SHA512

    100da2ae196aac5e147921e1208c179cf1bcdf51f4293bdd29a67b011e401af283fedeb1c46376c9f351955a72a5e0b5347fb49c10383504e3d32ed31c62c4cd

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    784.8MB

    MD5

    db88024fd3956ee46f8f9d3e40f23155

    SHA1

    7ce8e2194f3a14f75fd270363a476cfe83d8ea52

    SHA256

    d1c6ac6e8e14c0170ac54812d4aed6905e8d7044b9278b637c50ae2d24d0745e

    SHA512

    100da2ae196aac5e147921e1208c179cf1bcdf51f4293bdd29a67b011e401af283fedeb1c46376c9f351955a72a5e0b5347fb49c10383504e3d32ed31c62c4cd

  • memory/1616-142-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1616-136-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1616-134-0x0000000002E00000-0x00000000031D0000-memory.dmp

    Filesize

    3.8MB

  • memory/3880-148-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-156-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-145-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-141-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-150-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-152-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-154-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-144-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-158-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-160-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-162-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-164-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-166-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3880-168-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB