Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    299s
  • max time network
    297s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/04/2023, 22:24

General

  • Target

    ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77.exe

  • Size

    2.9MB

  • MD5

    028afcd4ee3a30be01e8f2c706afbfde

  • SHA1

    0148d10c8ee91f94aebf98c7d2bf00df48381df7

  • SHA256

    ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77

  • SHA512

    dc6a1eb2d1c7ec84b478afd2ecd48a6c9e309aa8ff61313a3f921c4556e8cd2cb77fe5728526422a969300d4e039f509024e04037ecbb95a3d2eacf820ff30cf

  • SSDEEP

    49152:bPGr1J/od7ddFIbB65HJwP7QVBfMtup6qYmg8jLyefHuD+MUvYDL3bNt+jDpe:ber1Bod7dYV65HuP7QVikQUgKLyew+MF

Malware Config

Extracted

Family

laplas

C2

http://163.123.142.220

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77.exe
    "C:\Users\Admin\AppData\Local\Temp\ff2705d0de6c188a2dc637e1d341b4fed1378543328704cbf4e30b1f02eaab77.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    841.9MB

    MD5

    9972f4e78afa69470f53943d8831b222

    SHA1

    9b7b2f116fb4e559685c9cd4ec31517145d2df46

    SHA256

    0db95bba22ae2dbd919093de4f925c850e21001794bf0b46a9c3d2b70bf3cbd9

    SHA512

    7de89b34ec9b2368d071c0417c3c63f1ea6475c368be068bdd1fe3e2052f090f2b5d8ddd4466c9825c7794eee04ee7241432113990d72a4e48c818f27dbe732d

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    841.9MB

    MD5

    9972f4e78afa69470f53943d8831b222

    SHA1

    9b7b2f116fb4e559685c9cd4ec31517145d2df46

    SHA256

    0db95bba22ae2dbd919093de4f925c850e21001794bf0b46a9c3d2b70bf3cbd9

    SHA512

    7de89b34ec9b2368d071c0417c3c63f1ea6475c368be068bdd1fe3e2052f090f2b5d8ddd4466c9825c7794eee04ee7241432113990d72a4e48c818f27dbe732d

  • memory/3608-116-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-118-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-119-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-120-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-121-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-122-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-123-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-125-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-126-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/3608-130-0x0000000000200000-0x0000000000AC9000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-144-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-152-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-134-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-135-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-136-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-137-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-138-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-139-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-140-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-141-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-142-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-143-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-131-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-145-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-147-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-148-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-149-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-150-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-151-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-133-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-153-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-154-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-155-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-156-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-157-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-158-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-159-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-160-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-161-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-162-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-163-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-164-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-165-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-166-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-167-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-168-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB

  • memory/4880-169-0x0000000000F70000-0x0000000001839000-memory.dmp

    Filesize

    8.8MB