Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 02:14

General

  • Target

    e7a69210f26c7944b6e267d0d73af320.exe

  • Size

    5.8MB

  • MD5

    e7a69210f26c7944b6e267d0d73af320

  • SHA1

    cc03fe693690e4f45a7cca31782292f69e505801

  • SHA256

    64b965beccd214a869629c202905642aec12eb0814bd773c264f845cb7a211e2

  • SHA512

    44345416a657e5612fe6af6d6203f25e5bb501862f83c0a688b8fbab0cdd4929b309e32fa6770fe18a47bf62d91688fc761761d0f457e37bbc11abe16adace07

  • SSDEEP

    98304:udcR2OyrVRPLlO/otpGnOYwxR7hv88+MqgtJjKniUDsMsqAnqCN7hm:ueVyrLg/onGl9pMbtJjKiOpAqCN7h

Malware Config

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7a69210f26c7944b6e267d0d73af320.exe
    "C:\Users\Admin\AppData\Local\Temp\e7a69210f26c7944b6e267d0d73af320.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
      "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    760.8MB

    MD5

    f4ab4a4ad9e119c7c84561a5b0cdf0c8

    SHA1

    ef1180aa408dbd9e91443349bfc6e96c7e120b94

    SHA256

    afb6e2066404eaf128a136a8d990cfabd537cad36e85f2723fbd7f6f2f108f05

    SHA512

    535ffa67042cc7d61d31315845447e93272a7b9fc8775a9a0e6448f25a2eff4a512b2d66718e3bc5cd8398071a173b82534010e260dc6c62b795f9d8497f2cdc

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    647.7MB

    MD5

    36f5d8ec3f6b3ec155cf2b6881136ee1

    SHA1

    c4286bc737f211c73993b120a6ed9e0c8138ab38

    SHA256

    a758589b47fa9168d599a5fbb9e0e907b3d415c5c8e3cd6dc086a1875628d629

    SHA512

    9ef4ea09193e1fd8a0c153c487321763006a983ff38b8e66a67611919c83c1123dcb15d7fb8b402c5006bb0ea785e2f78ef18cb024203b68ca736572b81cc41c

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    692.8MB

    MD5

    a2e832550781d5637f7f499848d734bb

    SHA1

    4d29508a6807a47e1e38f654bbdcc395b37a9767

    SHA256

    c940735ba45b80afc85973d43b826e11f9f9c92f152912dc955eaf0aff487fe4

    SHA512

    61cf01fe23bc4a3b4fdbc20b3484977f65c125b190f69f1e73de0f31e1e3ca1065f4580f3a4f240d7324f25b247afb481497f933e6d9e94ad962626a886aed35

  • memory/2752-133-0x0000000000EA0000-0x0000000000EA1000-memory.dmp

    Filesize

    4KB

  • memory/2752-134-0x0000000000400000-0x0000000000D10000-memory.dmp

    Filesize

    9.1MB

  • memory/4968-148-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/4968-149-0x0000000000400000-0x0000000000D10000-memory.dmp

    Filesize

    9.1MB