Analysis

  • max time kernel
    73s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2023 10:39

General

  • Target

    conhost.exe

  • Size

    4.0MB

  • MD5

    feccda803ece2e7a3b7e9798714ad47e

  • SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

  • SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

  • SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • SSDEEP

    49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe

Malware Config

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\conhost.exe
    "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:1420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    840.0MB

    MD5

    4cb8043c2853f205fddb76a1df29cf27

    SHA1

    97171dd6259e63eee6df5d35a75907bdbbc37f61

    SHA256

    a2d08e31462396f1af8692bea43170d25599cfa635462510e4701f879145fa07

    SHA512

    c0c9b758bdc921d818ddc727a29a67d66554cb28a052c4059c1db5024842f2d165260ded5be73969b18ad85c6561f083bc9b150f0ee4945523903f4e271459ab

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    588.7MB

    MD5

    5394cffafde00c3d9bfa3d5dd2945c0a

    SHA1

    7b187f6638953547b92d79b6c651602a2f24e8fa

    SHA256

    2f78c5c976b895634e33fa76aeebac3342ed254171a6bf771d55fb7fe22eaff0

    SHA512

    e03de5c09eacbd5050062a10ba3b631ecc07e8c6418ce4fb2155b7cf8798324a925c75d87b4b582ab692230fc58bb9089c4769cc34ec8ca2b19103ac4321659b

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    610.7MB

    MD5

    801757aaebb956c196c29ffdab0f0251

    SHA1

    c138171f609b82902efd930df1d5665a0e4a5f47

    SHA256

    88ee7979360ad52ad175d24923e8e1f9a392374d1b6c1b2bd2df4fe30336fa07

    SHA512

    d4d657737b256f27d5dbe12c9b90c9d7f7b42788380290fc7d930a1c46a0dbb2ad678a4669b6170d020e7ca02d1a5ef071ed51d8c7483cd8ed9d9ebef7c67976