Analysis

  • max time kernel
    47s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2023 02:14

General

  • Target

    6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe

  • Size

    5.9MB

  • MD5

    aa57f0d7a099773175006624cc891b29

  • SHA1

    44598d94dac6e9c72ffe65f9e17cf77c2c73e6fe

  • SHA256

    6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f

  • SHA512

    e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0

  • SSDEEP

    98304:5fsK1JWzYls9x4CwqEZSK84oBfrNy+yvsHrj0XXrmca/mDU9vf2eESEGMeNR:hbJWzY4x4Tq7Kx4ybsHEnrmyg9vsSEps

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe
    "C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:368
    • C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe
      C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe
      2⤵
        PID:1964
      • C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe
        C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe
        2⤵
          PID:1760
        • C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe
          C:\Users\Admin\AppData\Local\Temp\6227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f.exe
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
            "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1476
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:824
            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
              C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
              4⤵
                PID:1828
              • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
                C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
                4⤵
                  PID:1488
                • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
                  C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
                  4⤵
                    PID:1384

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IQ1TPGLCLWGSPBEH6TNC.temp

              Filesize

              7KB

              MD5

              7d1aec828a21b19a71bb64284cf8c626

              SHA1

              5dbc7e470de09ca99a196668d723e6d5e629462c

              SHA256

              cbc7be545387a6cb30d57d4a26c31ace9873d3fc2a7a5af6596c128cde804e52

              SHA512

              fb774e1c249376727a2772870e9108f0470b9bc3fa942a9e4c5dbeba25142ceac08a403912d21831ab530c573fda499fdc45cdb26ecf515321e9d8676590f8cc

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              7d1aec828a21b19a71bb64284cf8c626

              SHA1

              5dbc7e470de09ca99a196668d723e6d5e629462c

              SHA256

              cbc7be545387a6cb30d57d4a26c31ace9873d3fc2a7a5af6596c128cde804e52

              SHA512

              fb774e1c249376727a2772870e9108f0470b9bc3fa942a9e4c5dbeba25142ceac08a403912d21831ab530c573fda499fdc45cdb26ecf515321e9d8676590f8cc

            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              206.9MB

              MD5

              c4ec7c5960679336af653f7eba78c247

              SHA1

              6a2b464a183b142e38d716c09d921d929404967a

              SHA256

              102ef5e9d517d432af2ceed64d7ce47a2668e1c0a84a2c0a9a9268418b7f01f3

              SHA512

              b2cbb23ea8ffe78f5db5545aebad6bab7c58a4ca1ce05dd705ae9227eb645e7089d4674efaa9646b8ee48b8b1340d22710d6f9420e3c97f6bbfe57e9382a13c5

            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              159.4MB

              MD5

              d13af6e631e44133ea3a5fe6fc477c07

              SHA1

              a01419368f5b136a95304dc1fc6e576ab0d71da5

              SHA256

              bee91ea282294ed69193e7337067982d30d1a66d077aa0a3e007886daa8696d4

              SHA512

              f4e6c4c46b08c73ffabcd7a5a6ec3a973ef471d6b83fe992165bbe18066f138d0288436ed61a936cf74ec1559e7d4f7ed3ab83c4ccc612933dbc3ecdb856f308

            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              457.5MB

              MD5

              55f41048f50350399e21d48299b9d5c8

              SHA1

              4b29968f382cd15cc6539de777951f29aaeb0ff8

              SHA256

              862a1fa23bbce6995a06457a894de4de9f3c41fcb3149ace034ecc484e23fe48

              SHA512

              47e008140d6af9db54ec643f0ea7005eeac38e10909a3b68137445c490c6fe4793f754eced8a491e7d6d78fa36588d2b051bd0f7af6b24b411b3f41c01fba26b

            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              400.1MB

              MD5

              a3319c8d08190db9ff88227c0b6e1903

              SHA1

              034d93f97936ecbbfbcebf8cd16cb1aacfa665ec

              SHA256

              afd60a9dcabc9697598543907b1cf17987401b30a0ca64da6cde5ff0c3404473

              SHA512

              76cc12f4ddc4ac792945126f280d22b8c7d1d343584148ef97b59af5cf3029d417e5b7ea307bfd4669b9321d30d118868a8223dd1dd3a50b9c66baa317ceb237

            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              211.3MB

              MD5

              ed5432272fe726af5b62d78b15e0ee12

              SHA1

              cf7d5ff4ff556bfd83b9263f18e66bc59fb622af

              SHA256

              2ebdd0c62eafd3f5b78095d352cf8417fff115c2e522ec9df6c608457c68dc82

              SHA512

              30edb5314fd185c6e6efa3d8d1f80c1efafaa6c080fb14e6036ad7cb0731aad2398e9b5b90549e3c793d52c6ba92a0ad340fb6beaf9f8285a38f3f7a16d98f48

            • \Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              424.1MB

              MD5

              804780d257be5b12fd79385fd0f6aa45

              SHA1

              806e985a89f042eab10901fed8e07ca4fb3b67f7

              SHA256

              0c07beda8bb550b4df5d8c7401a60d68f552fff2a73e62bfa817b403ba63a1dd

              SHA512

              39500de22545f711da96344d0dabeaa0bbb097b94bd8c031a2ba0a7f834ded1d4eba446b888320f6fd89b0633f63fe4c73b1d9ea58c076af9c4b05dfcb0bb1d9

            • memory/368-63-0x0000000002240000-0x0000000002280000-memory.dmp

              Filesize

              256KB

            • memory/368-62-0x0000000002240000-0x0000000002280000-memory.dmp

              Filesize

              256KB

            • memory/368-65-0x0000000002240000-0x0000000002280000-memory.dmp

              Filesize

              256KB

            • memory/748-66-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-67-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-70-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-71-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-72-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/748-73-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-75-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-76-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-68-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-69-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/748-82-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/824-94-0x00000000025D0000-0x0000000002610000-memory.dmp

              Filesize

              256KB

            • memory/824-98-0x00000000025D0000-0x0000000002610000-memory.dmp

              Filesize

              256KB

            • memory/824-97-0x00000000025D0000-0x0000000002610000-memory.dmp

              Filesize

              256KB

            • memory/824-96-0x00000000025D0000-0x0000000002610000-memory.dmp

              Filesize

              256KB

            • memory/824-93-0x00000000025D0000-0x0000000002610000-memory.dmp

              Filesize

              256KB

            • memory/1384-112-0x0000000000400000-0x0000000000484000-memory.dmp

              Filesize

              528KB

            • memory/1384-107-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/1476-86-0x0000000004C10000-0x0000000004C50000-memory.dmp

              Filesize

              256KB

            • memory/1476-95-0x0000000004C10000-0x0000000004C50000-memory.dmp

              Filesize

              256KB

            • memory/1476-85-0x0000000000060000-0x00000000002A8000-memory.dmp

              Filesize

              2.3MB

            • memory/1992-58-0x0000000002140000-0x0000000002176000-memory.dmp

              Filesize

              216KB

            • memory/1992-59-0x0000000004910000-0x00000000049A2000-memory.dmp

              Filesize

              584KB

            • memory/1992-64-0x0000000000730000-0x0000000000770000-memory.dmp

              Filesize

              256KB

            • memory/1992-57-0x00000000052C0000-0x00000000053F4000-memory.dmp

              Filesize

              1.2MB

            • memory/1992-56-0x0000000000730000-0x0000000000770000-memory.dmp

              Filesize

              256KB

            • memory/1992-55-0x0000000005120000-0x00000000052BE000-memory.dmp

              Filesize

              1.6MB

            • memory/1992-54-0x0000000000080000-0x00000000002C8000-memory.dmp

              Filesize

              2.3MB