Analysis

  • max time kernel
    293s
  • max time network
    302s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-04-2023 23:18

General

  • Target

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe

  • Size

    3.0MB

  • MD5

    dbdba768cb5b67b0842eda1e3c11974c

  • SHA1

    ee2a619faeec9d1a264cd2940aaa2b90f2664f7a

  • SHA256

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

  • SHA512

    6d307722d4c5884e2e512481e7a7dc33b4e7b3323937d2abd5defa9e2b5c1600f10002e6d1eee5b55b11c5e1e2551508da5b770d7b538b123b224f266c5a6c0f

  • SSDEEP

    49152:BkdbxujNKgmVvtcLH7QAjiSIXHhWW4055ugkQyAzKhUpMvUAl1qHIoxJlrgrp1b3:apxujNKgCvtjhRj5h4huMvU41qooxr03

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe
    "C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:3196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    713.0MB

    MD5

    66630c507a70f557f972602c4fc7f117

    SHA1

    f9dcc5c1d80464d4daa1270b9c738bbd28debfea

    SHA256

    2228c64d969951b7c5b61aadb275bb864a7e98be82a4ab1db008c9e56c6ab7d3

    SHA512

    8f447ee0521e1ec88d8b522306c4288db944c3ffdc0daf6f4fee4601af4583183bf33c0ec34f672ddf322a696664f3deb0aad7a358cbcf616c89af05fbcd171d

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    713.0MB

    MD5

    66630c507a70f557f972602c4fc7f117

    SHA1

    f9dcc5c1d80464d4daa1270b9c738bbd28debfea

    SHA256

    2228c64d969951b7c5b61aadb275bb864a7e98be82a4ab1db008c9e56c6ab7d3

    SHA512

    8f447ee0521e1ec88d8b522306c4288db944c3ffdc0daf6f4fee4601af4583183bf33c0ec34f672ddf322a696664f3deb0aad7a358cbcf616c89af05fbcd171d

  • memory/2496-127-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-124-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-125-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-126-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-121-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-128-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-129-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-131-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-123-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-122-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/2496-134-0x0000000000A60000-0x0000000001352000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-149-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-156-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-139-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-140-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-141-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-142-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-143-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-144-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-146-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-147-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-148-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-137-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-150-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-151-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-152-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-154-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-155-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-138-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-157-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-158-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-159-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-160-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-161-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-162-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-163-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-164-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-165-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-166-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-167-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-168-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-169-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-170-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-171-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-172-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-173-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB

  • memory/3196-174-0x00000000002D0000-0x0000000000BC2000-memory.dmp

    Filesize

    8.9MB