Analysis

  • max time kernel
    300s
  • max time network
    297s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-04-2023 22:17

General

  • Target

    30f6c0d325722cd1df1b9f20bbf577e60d0aac2d27b64022964ec6da23455d0b.exe

  • Size

    3.2MB

  • MD5

    fb265a033f73e76e65b986aeb244bdc1

  • SHA1

    572ac5b5c2add735b8e48ffa3cfa9fe8013db02f

  • SHA256

    30f6c0d325722cd1df1b9f20bbf577e60d0aac2d27b64022964ec6da23455d0b

  • SHA512

    efc43cab937df492a9f1ec415b1196f82115a34e39ff575224184bf684ab2106b9590824d81bd2280d65adcd7eb79bbc51990fadfa1bbab7212709db415f851f

  • SSDEEP

    98304:B2tkY/QxN4xrAENowY5obMTPzL1/VCpxr5GPdA2uxRoF:kt//yaOooTPXtVCz8Pd1uxC

Malware Config

Extracted

Family

laplas

C2

http://185.209.161.89

Attributes
  • api_key

    6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30f6c0d325722cd1df1b9f20bbf577e60d0aac2d27b64022964ec6da23455d0b.exe
    "C:\Users\Admin\AppData\Local\Temp\30f6c0d325722cd1df1b9f20bbf577e60d0aac2d27b64022964ec6da23455d0b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    750.2MB

    MD5

    986e7d32cc6a482805c2b5e1c2a59917

    SHA1

    0bcc2b0469c0690afdb4d3917ca52d2ab893da69

    SHA256

    21e6c9aeac0c3c1ed4b32ae4c78dd81099b8bd5429d78eb9d562fc4065a53e0e

    SHA512

    a30bb45bc564698a9484389627a4dc4a2d0ac59db6d4cebda436c9e526b8b304ec7e2673cc1385ef91cf76f5390d4a24531d5f618fb2e32250daca303df6b6c4

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    750.1MB

    MD5

    b220dcb1574f93bce1b3b6ba4db051ee

    SHA1

    c77aa421f7e9fb7c54f86ff9af6e8420d9829008

    SHA256

    a52a834abb6207a21cb9d4be998e95b93d6fbc7644ac015538ff1154a075bb8a

    SHA512

    bda31f3ffdd504bcc6634f76bf576094eae4e79ef5ca7a9a0ceb20054e561d620c323b6b00822c253c73662b38c9f92682d3b42abb6bbdd0a8d552473b85c971

  • memory/2288-121-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-122-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-123-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-124-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-125-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-126-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-127-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-128-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-130-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2288-133-0x0000000000BE0000-0x00000000014FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-135-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-136-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-137-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-138-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-139-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-140-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-141-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-142-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-143-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-144-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-145-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-146-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-147-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-148-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-149-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-151-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-152-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-153-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-154-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-155-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-156-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-157-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-158-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-159-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-160-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-161-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-162-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-163-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-164-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-165-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-166-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-167-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-168-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-169-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-170-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-171-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-172-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB

  • memory/2968-173-0x0000000000FE0000-0x00000000018FA000-memory.dmp

    Filesize

    9.1MB