Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    28s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2023, 23:00

General

  • Target

    conhost.exe

  • Size

    4.0MB

  • MD5

    feccda803ece2e7a3b7e9798714ad47e

  • SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

  • SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

  • SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • SSDEEP

    49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe

Malware Config

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe
    "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:1948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    532.4MB

    MD5

    4c09076c883bb80da1f1a2103c9154a0

    SHA1

    d2cc801f2ee3eb6430b65641a261113e25caa9fb

    SHA256

    dc68977bea776aaaca5a2b234ff7dc0d83e730be6db942e5a5580c113437a1be

    SHA512

    9129592c007d034a006ec665d477a0824e341b001b434de3afe9d9269ce8b25fb5d273e4d7ce4117d5bcb933cfe170117764b5834697a867461dde20b06d6521

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    529.3MB

    MD5

    5d8084ef4646f58ba5fdc652f43e6400

    SHA1

    a77bfc301afc381267a8edd4e4ae36ad10f76ede

    SHA256

    31c57559ca3ae7672fa7faa4ee37937259d32d9dab4e3762b00d881d5ec4c82a

    SHA512

    c758f7ddc3854ba7a9a5dd2a26fcc9dfb6503edacb621672c09092fdd25fe7bcdac72d8fe0b9d033718ca23cda5adc882f525d98a81bf85bf2fb2d7ae2d28970

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    537.0MB

    MD5

    6fdcbe2fc41f1b8565f57e9c48a99b31

    SHA1

    e4b855e4b6be83b0c330384181811f5a40fce96f

    SHA256

    e706ae56fd1271ca5c005e15ded6f6712c3a01cd8e02ef1549759f3cf54f3d3b

    SHA512

    8d96418b6e3defc0d36fd24c6dea6dfc2792b1898d203c229e3c4daf09680bff2f11d0078a7c701a375e3260e47248ea318727a806353b0117745b6c2f80b735