Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 03:24

General

  • Target

    73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b.exe

  • Size

    3.0MB

  • MD5

    767368afad019d5edbe21da0624d0aeb

  • SHA1

    5679da5ac1514c7a73a790b23bea7ac972e0d2f8

  • SHA256

    73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b

  • SHA512

    5b397df629a76c57577e5dea05bb31df820aae61984b54986a13f058e9e13ed651921122819e2483d3546bd7b7fbf81f9c1370f10c90c15b6cc678f4f9cffaef

  • SSDEEP

    49152:mhhQZmZBmCB7jzyqnqlaHprubMKs4PTu4853wLPrs9Sirh67l+G5IkT6d+1X1pe:mXtZICB7jmq4AHMywLP4nrc5I3+l6

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b.exe
    "C:\Users\Admin\AppData\Local\Temp\73341bc80c4983f7e88d3fc0e95b8746aa00cb8acba2b3e08776782a2d53941b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    623.4MB

    MD5

    3de6f78f9a24e6eb0084f5904b1b523b

    SHA1

    d83746b6f501128f22fa986348ac0d1dfff09ef0

    SHA256

    4905e4e8591b327143dca7186ee3bcfb5c52aa08f1dd749ad15afa9c1b4a15e7

    SHA512

    d1f67c00bc335823f37d3161f606933dd7b0c9c838447e7928dcd4b312a9e82c40ee5ef1bedbeb42a127976462ac32fa38bf9a7c71f9e0d464e2b344c8f5bfbe

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    651.1MB

    MD5

    981afabc00577b9fa0c5184c7194b3a5

    SHA1

    504c07863b2d6f364cec395d766bc0d4e90aa25e

    SHA256

    95e31bf18e1086b05eb4b7244dafda7c9686d81e1d2965ef5f5e97ba02b9a1b3

    SHA512

    64b6da1efef5c847080e52c833dc81428bcc344b5565f0505dfa1bfe86ae3c0d1d111ae8cf1ed60b0e41e2a3546c4a7f80353f89f9247204cbe0705d25c50613

  • memory/2568-159-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-163-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-170-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-153-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-169-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-168-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-167-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-154-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-166-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-165-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-164-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-158-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-149-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-155-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-151-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-152-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-161-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-160-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-150-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-156-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2568-157-0x0000000000E00000-0x00000000016E0000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-135-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-133-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-142-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-138-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-148-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-134-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-136-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-144-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-141-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-140-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-139-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB

  • memory/2604-137-0x00000000002B0000-0x0000000000B90000-memory.dmp

    Filesize

    8.9MB