Analysis

  • max time kernel
    269s
  • max time network
    288s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2023 23:18

General

  • Target

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe

  • Size

    3.0MB

  • MD5

    dbdba768cb5b67b0842eda1e3c11974c

  • SHA1

    ee2a619faeec9d1a264cd2940aaa2b90f2664f7a

  • SHA256

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

  • SHA512

    6d307722d4c5884e2e512481e7a7dc33b4e7b3323937d2abd5defa9e2b5c1600f10002e6d1eee5b55b11c5e1e2551508da5b770d7b538b123b224f266c5a6c0f

  • SSDEEP

    49152:BkdbxujNKgmVvtcLH7QAjiSIXHhWW4055ugkQyAzKhUpMvUAl1qHIoxJlrgrp1b3:apxujNKgCvtjhRj5h4huMvU41qooxr03

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe
    "C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    719.0MB

    MD5

    1e110d96948c5c03e0cfe5d14483b8dc

    SHA1

    cd627833a6be05466414bf0953b0d8a74e1c394d

    SHA256

    ae5cfbb213ea9d2739098d2e4d07e8d4300be024a06a527b29b96c9bba7d920a

    SHA512

    dfee2b31d846b4d709e5a9d7b569e9215b18ebc7aa93f5a991111244e4c80f06d5f34c24fce314a843ca5eb163df057f40168ed95018d9f43fd6eb376d49b4fa

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    719.0MB

    MD5

    1e110d96948c5c03e0cfe5d14483b8dc

    SHA1

    cd627833a6be05466414bf0953b0d8a74e1c394d

    SHA256

    ae5cfbb213ea9d2739098d2e4d07e8d4300be024a06a527b29b96c9bba7d920a

    SHA512

    dfee2b31d846b4d709e5a9d7b569e9215b18ebc7aa93f5a991111244e4c80f06d5f34c24fce314a843ca5eb163df057f40168ed95018d9f43fd6eb376d49b4fa

  • memory/1420-54-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-55-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-57-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-56-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-58-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-59-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-60-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-61-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1420-66-0x0000000000D90000-0x0000000001682000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-80-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-86-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-69-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-70-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-71-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-72-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-73-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-74-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-75-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-76-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-77-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-67-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-81-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-82-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-83-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-84-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-85-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-68-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-87-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-88-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-89-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-90-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-91-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-92-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-93-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-94-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-95-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-96-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-97-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-98-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-99-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-100-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-101-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB

  • memory/1664-102-0x00000000012B0000-0x0000000001BA2000-memory.dmp

    Filesize

    8.9MB