Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2023, 04:39

General

  • Target

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe

  • Size

    3.0MB

  • MD5

    dbdba768cb5b67b0842eda1e3c11974c

  • SHA1

    ee2a619faeec9d1a264cd2940aaa2b90f2664f7a

  • SHA256

    9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c

  • SHA512

    6d307722d4c5884e2e512481e7a7dc33b4e7b3323937d2abd5defa9e2b5c1600f10002e6d1eee5b55b11c5e1e2551508da5b770d7b538b123b224f266c5a6c0f

  • SSDEEP

    49152:BkdbxujNKgmVvtcLH7QAjiSIXHhWW4055ugkQyAzKhUpMvUAl1qHIoxJlrgrp1b3:apxujNKgCvtjhRj5h4huMvU41qooxr03

Malware Config

Extracted

Family

laplas

C2

http://45.159.189.33

Attributes
  • api_key

    d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe
    "C:\Users\Admin\AppData\Local\Temp\9413ab68cf54b6b8132bfe9048d58ede4e1591f6add2516faf39a165a914be8c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:3356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    547.5MB

    MD5

    836422df6d54288e96fcdfd0629a0f52

    SHA1

    5415d2031d7a022241c63a365b70df2be5cdc1f8

    SHA256

    240dda961f50c78f876dd2bf36ee2164b937be72b9e3de580aad4a165b5cfe0e

    SHA512

    5654d8311d1599837008c4dd40074f3711370dd2123a28b21fcc5b9ffcd02927d0a77f4baeb0e568af52b7cd9fae69f0065259df76b2969d3e8f8ad05b99cc68

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    548.2MB

    MD5

    bb16dbb2ffb98153d6c4d38e1e10aad1

    SHA1

    22dbfbef9c358730e36a96727d3de3c42ced60c9

    SHA256

    767223d9314a2b2106a5dcda397c136603f53eac008c5b7864a46d7da29419d6

    SHA512

    11683e6282514db5526371625e5534f6f8bbce8b88e294e80bc9705f956db9a0b25ea3489b01296a71d2a257e1e6e81263fc4afc798ab99c7aaa0ad3b74a52f8

  • memory/3356-160-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-164-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-171-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-170-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-169-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-168-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-167-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-166-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-165-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-155-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-163-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-161-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-149-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-150-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-151-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-152-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-159-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-154-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-153-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-156-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/3356-158-0x0000000000C20000-0x0000000001512000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-136-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-133-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-147-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-134-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-135-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-144-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-142-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-141-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-139-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-140-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-138-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB

  • memory/4532-137-0x0000000000E10000-0x0000000001702000-memory.dmp

    Filesize

    8.9MB