Analysis

  • max time kernel
    293s
  • max time network
    324s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2023 20:14

General

  • Target

    PC-Files_Expert-2O23/Laucnher-PC-S0FT-2O23.exe

  • Size

    730.0MB

  • MD5

    ac806cf293cada210b512a642e290a33

  • SHA1

    e8dfe030d105a95d76936848b83187f382c7cd43

  • SHA256

    794997ce49323e2620efdd9a2a34d364890313cb0984e909a5cf589d4072f17e

  • SHA512

    4201478b7f39f29e0984a3828a5e23450eaeb688d8bcb7e5e0a29a5a4dae9f603bc87fb9595ee701f4e258bea13838dd72d8743e8423c92c156fc28ba0bbb9e8

  • SSDEEP

    196608:kSpje7hK/Y1X+MfKclMp5daT7OfO8to35qUB7+A4FNv:kSte7hi1M8faOfFIE

Malware Config

Extracted

Family

raccoon

Botnet

f752420247e5bcc46230c6129c34c6a2

C2

http://95.216.153.86/

http://5.75.159.229/

http://212.113.119.153/

http://78.153.130.123/

xor.plain

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PC-Files_Expert-2O23\Laucnher-PC-S0FT-2O23.exe
    "C:\Users\Admin\AppData\Local\Temp\PC-Files_Expert-2O23\Laucnher-PC-S0FT-2O23.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Users\Admin\AppData\LocalLow\uNSPnCk3.exe
      "C:\Users\Admin\AppData\LocalLow\uNSPnCk3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3772
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
          PID:1548
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 1032
            4⤵
            • Program crash
            PID:4140
      • C:\Users\Admin\AppData\Roaming\30sm48O7.exe
        "C:\Users\Admin\AppData\Roaming\30sm48O7.exe"
        2⤵
        • Executes dropped EXE
        PID:2496
      • C:\Users\Admin\AppData\Local\Temp\tI8dDH6G.exe
        "C:\Users\Admin\AppData\Local\Temp\tI8dDH6G.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4612
        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
          "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:3468
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1548 -ip 1548
      1⤵
        PID:3592

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\mozglue.dll

        Filesize

        612KB

        MD5

        f07d9977430e762b563eaadc2b94bbfa

        SHA1

        da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

        SHA256

        4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

        SHA512

        6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

      • C:\Users\Admin\AppData\LocalLow\nss3.dll

        Filesize

        1.9MB

        MD5

        f67d08e8c02574cbc2f1122c53bfb976

        SHA1

        6522992957e7e4d074947cad63189f308a80fcf2

        SHA256

        c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

        SHA512

        2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

      • C:\Users\Admin\AppData\LocalLow\sqlite3.dll

        Filesize

        1.0MB

        MD5

        dbf4f8dcefb8056dc6bae4b67ff810ce

        SHA1

        bbac1dd8a07c6069415c04b62747d794736d0689

        SHA256

        47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

        SHA512

        b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

      • C:\Users\Admin\AppData\LocalLow\uNSPnCk3.exe

        Filesize

        276KB

        MD5

        6eaea6974cd276b74e4783fe75a98bb6

        SHA1

        3587175eb64552fb8c76655d2c4b3ab9a83f7890

        SHA256

        29dfae95832708e0d7adae77c048b3537d402950a1460f2e589bf803889bc9e3

        SHA512

        7b1f8b74b9e2a0a89b29a1f3c77b3afa940f17d133af6e6e67e53adb60591c021882f3bc604bb0d1599aeb111327cef31d87915f8abb237bde9ec221d58e029b

      • C:\Users\Admin\AppData\LocalLow\uNSPnCk3.exe

        Filesize

        276KB

        MD5

        6eaea6974cd276b74e4783fe75a98bb6

        SHA1

        3587175eb64552fb8c76655d2c4b3ab9a83f7890

        SHA256

        29dfae95832708e0d7adae77c048b3537d402950a1460f2e589bf803889bc9e3

        SHA512

        7b1f8b74b9e2a0a89b29a1f3c77b3afa940f17d133af6e6e67e53adb60591c021882f3bc604bb0d1599aeb111327cef31d87915f8abb237bde9ec221d58e029b

      • C:\Users\Admin\AppData\LocalLow\uNSPnCk3.exe

        Filesize

        276KB

        MD5

        6eaea6974cd276b74e4783fe75a98bb6

        SHA1

        3587175eb64552fb8c76655d2c4b3ab9a83f7890

        SHA256

        29dfae95832708e0d7adae77c048b3537d402950a1460f2e589bf803889bc9e3

        SHA512

        7b1f8b74b9e2a0a89b29a1f3c77b3afa940f17d133af6e6e67e53adb60591c021882f3bc604bb0d1599aeb111327cef31d87915f8abb237bde9ec221d58e029b

      • C:\Users\Admin\AppData\Local\Temp\tI8dDH6G.exe

        Filesize

        726.7MB

        MD5

        bbd00ec4e0a57e9c3bc8b57c6d22e4ac

        SHA1

        c0463ce8ef9dcf563e4321ffcdf86ca4ee2a8b97

        SHA256

        ef459820a29f16850147c08c143b76a58990c1813edaaf5bfad20aa05e65a4d8

        SHA512

        178017fb9fd541aba2d342829c0f81411d334b826eb0a003a4654734bfb58364b6e130f749454d32b61e2a55a8e552a9986fece6b1db34ed18396c27c84c9419

      • C:\Users\Admin\AppData\Local\Temp\tI8dDH6G.exe

        Filesize

        726.7MB

        MD5

        bbd00ec4e0a57e9c3bc8b57c6d22e4ac

        SHA1

        c0463ce8ef9dcf563e4321ffcdf86ca4ee2a8b97

        SHA256

        ef459820a29f16850147c08c143b76a58990c1813edaaf5bfad20aa05e65a4d8

        SHA512

        178017fb9fd541aba2d342829c0f81411d334b826eb0a003a4654734bfb58364b6e130f749454d32b61e2a55a8e552a9986fece6b1db34ed18396c27c84c9419

      • C:\Users\Admin\AppData\Local\Temp\tI8dDH6G.exe

        Filesize

        726.7MB

        MD5

        bbd00ec4e0a57e9c3bc8b57c6d22e4ac

        SHA1

        c0463ce8ef9dcf563e4321ffcdf86ca4ee2a8b97

        SHA256

        ef459820a29f16850147c08c143b76a58990c1813edaaf5bfad20aa05e65a4d8

        SHA512

        178017fb9fd541aba2d342829c0f81411d334b826eb0a003a4654734bfb58364b6e130f749454d32b61e2a55a8e552a9986fece6b1db34ed18396c27c84c9419

      • C:\Users\Admin\AppData\Roaming\30sm48O7.exe

        Filesize

        52KB

        MD5

        13e943e4a218b36c30fcc7fe865d5d93

        SHA1

        9fb188959cc18b754db75a50240973abe05d1635

        SHA256

        3fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4

        SHA512

        c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f

      • C:\Users\Admin\AppData\Roaming\30sm48O7.exe

        Filesize

        52KB

        MD5

        13e943e4a218b36c30fcc7fe865d5d93

        SHA1

        9fb188959cc18b754db75a50240973abe05d1635

        SHA256

        3fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4

        SHA512

        c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f

      • C:\Users\Admin\AppData\Roaming\30sm48O7.exe

        Filesize

        52KB

        MD5

        13e943e4a218b36c30fcc7fe865d5d93

        SHA1

        9fb188959cc18b754db75a50240973abe05d1635

        SHA256

        3fd21096eba51f31191f95a3771c54274748666f101868a5b061847f0853cdb4

        SHA512

        c3d646f145f7044d37fbd7eaecba508eb8d54be4741216c9d75e43f44c0370dcc67d05566e9772519f44c1c34e3bda77466e7a12ce0cd6b00e7e895ec5d6241f

      • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

        Filesize

        182.0MB

        MD5

        9c4178458be3e9e167c2a961ff3f1257

        SHA1

        6ada4a0c970944e3378f51b4940c2a476a81eb3a

        SHA256

        e0bf44cd02143e61175a20ad446f4db7e2d47e680b76d360c227d88fe875b8e8

        SHA512

        9f4edf8e00e9460b90d5e473f174825e48c1fc33ae4b10d234ed1108055721a0523454bf1b9ee2c7e4629b63ab4bd7ab936fb3105a9545101c38b87f9c54cac8

      • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

        Filesize

        178.2MB

        MD5

        04104a7396a4e1801d27f29da33ebbd1

        SHA1

        bcf1afdac293ee2f9b5ffd453500434fcf4efb28

        SHA256

        28e0982f22973cd9f586f63d0f3ec4c92e21bcb65df3c333a7f841bbe7b4d090

        SHA512

        db8d80491f504647bc398262c1f7ffc8293d65446c485d650adf37a13adcb35abba177d9e4afef0d09f8784b3757dd8f8ec041e8abb147de20612d2475630426

      • memory/1548-233-0x0000000007770000-0x000000000777A000-memory.dmp

        Filesize

        40KB

      • memory/1548-223-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1548-234-0x00000000079F0000-0x0000000007A56000-memory.dmp

        Filesize

        408KB

      • memory/1548-232-0x0000000007AE0000-0x0000000007AF0000-memory.dmp

        Filesize

        64KB

      • memory/2496-239-0x00000000054A0000-0x00000000054B0000-memory.dmp

        Filesize

        64KB

      • memory/2496-228-0x0000000000A20000-0x0000000000A34000-memory.dmp

        Filesize

        80KB

      • memory/2496-236-0x00000000054A0000-0x00000000054B0000-memory.dmp

        Filesize

        64KB

      • memory/2496-238-0x00000000054A0000-0x00000000054B0000-memory.dmp

        Filesize

        64KB

      • memory/2496-231-0x00000000054A0000-0x00000000054B0000-memory.dmp

        Filesize

        64KB

      • memory/2496-230-0x0000000005300000-0x0000000005392000-memory.dmp

        Filesize

        584KB

      • memory/2496-229-0x0000000005990000-0x0000000005F34000-memory.dmp

        Filesize

        5.6MB

      • memory/3468-285-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

        Filesize

        4KB

      • memory/3468-286-0x00000000013D0000-0x00000000013D1000-memory.dmp

        Filesize

        4KB

      • memory/3468-292-0x0000000000070000-0x0000000000B11000-memory.dmp

        Filesize

        10.6MB

      • memory/3468-291-0x0000000002F30000-0x0000000002F31000-memory.dmp

        Filesize

        4KB

      • memory/3468-290-0x0000000001480000-0x0000000001481000-memory.dmp

        Filesize

        4KB

      • memory/3468-289-0x0000000001470000-0x0000000001471000-memory.dmp

        Filesize

        4KB

      • memory/3468-288-0x0000000001410000-0x0000000001411000-memory.dmp

        Filesize

        4KB

      • memory/3468-287-0x00000000013E0000-0x00000000013E1000-memory.dmp

        Filesize

        4KB

      • memory/4008-186-0x0000000061E00000-0x0000000061EF1000-memory.dmp

        Filesize

        964KB

      • memory/4008-134-0x0000000000400000-0x0000000001520000-memory.dmp

        Filesize

        17.1MB

      • memory/4008-133-0x0000000001520000-0x0000000001521000-memory.dmp

        Filesize

        4KB

      • memory/4612-264-0x0000000001580000-0x0000000001581000-memory.dmp

        Filesize

        4KB

      • memory/4612-271-0x0000000000AD0000-0x0000000001571000-memory.dmp

        Filesize

        10.6MB

      • memory/4612-269-0x00000000015E0000-0x00000000015E1000-memory.dmp

        Filesize

        4KB

      • memory/4612-270-0x00000000015F0000-0x00000000015F1000-memory.dmp

        Filesize

        4KB

      • memory/4612-268-0x00000000015D0000-0x00000000015D1000-memory.dmp

        Filesize

        4KB

      • memory/4612-267-0x00000000015C0000-0x00000000015C1000-memory.dmp

        Filesize

        4KB

      • memory/4612-265-0x0000000001590000-0x0000000001591000-memory.dmp

        Filesize

        4KB

      • memory/4612-266-0x00000000015A0000-0x00000000015A1000-memory.dmp

        Filesize

        4KB