Analysis

  • max time kernel
    272s
  • max time network
    294s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2023 22:24

General

  • Target

    ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77.exe

  • Size

    2.9MB

  • MD5

    028afcd4ee3a30be01e8f2c706afbfde

  • SHA1

    0148d10c8ee91f94aebf98c7d2bf00df48381df7

  • SHA256

    ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77

  • SHA512

    dc6a1eb2d1c7ec84b478afd2ecd48a6c9e309aa8ff61313a3f921c4556e8cd2cb77fe5728526422a969300d4e039f509024e04037ecbb95a3d2eacf820ff30cf

  • SSDEEP

    49152:bPGr1J/od7ddFIbB65HJwP7QVBfMtup6qYmg8jLyefHuD+MUvYDL3bNt+jDpe:ber1Bod7dYV65HuP7QVikQUgKLyew+MF

Malware Config

Extracted

Family

laplas

C2

http://163.123.142.220

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77.exe
    "C:\Users\Admin\AppData\Local\Temp\ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    748.9MB

    MD5

    9f38760388ee3aff9531b4bd320bac17

    SHA1

    7fed1d6fc659c939d7b7fe3ecccf235a88c01c06

    SHA256

    552b987ee343725c6fc90fa508ccfccb01913094c6de987668d27ac5c470822b

    SHA512

    865e524dd4377cfdf575ace3fc5a27d70bb8299ad1b595cbf8991d3f13ab01aac59646cf2ed6acb1f056bef2d6922a7f5f98caa213bd8941e0a4be425137f0b5

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    748.9MB

    MD5

    9f38760388ee3aff9531b4bd320bac17

    SHA1

    7fed1d6fc659c939d7b7fe3ecccf235a88c01c06

    SHA256

    552b987ee343725c6fc90fa508ccfccb01913094c6de987668d27ac5c470822b

    SHA512

    865e524dd4377cfdf575ace3fc5a27d70bb8299ad1b595cbf8991d3f13ab01aac59646cf2ed6acb1f056bef2d6922a7f5f98caa213bd8941e0a4be425137f0b5

  • memory/1164-80-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-93-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-105-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-81-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-104-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-103-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-102-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-101-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-100-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-69-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-99-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-71-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-84-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-73-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-74-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-75-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-76-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-77-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-78-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-79-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-70-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-98-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-72-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-85-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-86-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-87-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-88-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-89-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-90-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-91-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-92-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-97-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-94-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-95-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1164-96-0x00000000008F0000-0x00000000011B9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-58-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-60-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-54-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-64-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-68-0x0000000028820000-0x00000000290E9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-55-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-57-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-61-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB

  • memory/1376-59-0x0000000001310000-0x0000000001BD9000-memory.dmp

    Filesize

    8.8MB