Analysis

  • max time kernel
    140s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 04:39

General

  • Target

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe

  • Size

    3.0MB

  • MD5

    dbdba768cb5b67b0842eda1e3c11974c

  • SHA1

    ee2a619faeec9d1a264cd2940aaa2b90f2664f7a

  • SHA256

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

  • SHA512

    6d307722d4c5884e2e512481e7a7dc33b4e7b3323937d2abd5defa9e2b5c1600f10002e6d1eee5b55b11c5e1e2551508da5b770d7b538b123b224f266c5a6c0f

  • SSDEEP

    49152:BkdbxujNKgmVvtcLH7QAjiSIXHhWW4055ugkQyAzKhUpMvUAl1qHIoxJlrgrp1b3:apxujNKgCvtjhRj5h4huMvU41qooxr03

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe
    "C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    616.6MB

    MD5

    d1a3c8e7b79084a3b83f3cb167994405

    SHA1

    d73da23e7f6cc74754695f96b84f68e9e03ec350

    SHA256

    15078b0f898042f5a853551fc87a74cd3ece64d62c8013222c62cd3e6b4c3525

    SHA512

    8849e4f69b40c6d55a732416bfe661ac8e872a3b543f90478a1ac2b55ff477db0abd6f2f824085d1addfa8a651f2512807080b28efbda44fbde1018a95530aba

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    624.4MB

    MD5

    1949ab26ac8223ad11b5784cea65b35d

    SHA1

    7aa9371afd60c8b3fe53232d1882ab9a6988519e

    SHA256

    bee6aa2ade7ab3ddae08eda66ad9f316b7c3057abf8a7e923d821fdc2ef719e6

    SHA512

    e9d0e55835451cb8265c59441df18dae0759e3b540ab80b842173a9ab95704623540f5f74ad1865b857cd898a247d22864efaf769383d29dfb3a45a4c05f1e5d

  • memory/1280-60-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-57-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-58-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-59-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-54-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-61-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-62-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-63-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-65-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-66-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-56-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-55-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1280-71-0x00000000001A0000-0x0000000000A92000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-74-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-81-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-73-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-75-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-76-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-77-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-78-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-79-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-80-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-72-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-82-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-83-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-86-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-87-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-88-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-89-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-90-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB

  • memory/1876-91-0x00000000000D0000-0x00000000009C2000-memory.dmp

    Filesize

    8.9MB