Analysis

  • max time kernel
    58s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2023 23:36

General

  • Target

    bfd1dad193b0dab4f36b3a3021dcc5b9.exe

  • Size

    6.6MB

  • MD5

    bfd1dad193b0dab4f36b3a3021dcc5b9

  • SHA1

    1030f8303d36b4be1004cf5848b54bfb6d84fa52

  • SHA256

    577008901c87ac135164e22a9dd8d9467c1d92ef2288157c95be49571a93be95

  • SHA512

    dafc0fd4a2fd0e8ee62e644eca73af35a56ed70549e98d7e9d329d89dd12bb81a9e4ef747b81d4a2d41eeb1a72f17fa0086b8e454f4e7c4c423a7dd3a7fa41b7

  • SSDEEP

    98304:cq6rgZZ0WMY+gPeFy0OvJv4JTfdnwuFE9HdvzxCCExUs10NhfgYCjcZ:+qZ+YWy0OVuRnwuFKBxCrUs0hIYCw

Malware Config

Extracted

Family

laplas

C2

http://185.223.93.251

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfd1dad193b0dab4f36b3a3021dcc5b9.exe
    "C:\Users\Admin\AppData\Local\Temp\bfd1dad193b0dab4f36b3a3021dcc5b9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\13Hw6mI3.exe
      "C:\Users\Admin\AppData\Local\Temp\13Hw6mI3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
        C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
        3⤵
        • Executes dropped EXE
        PID:1524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\13Hw6mI3.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\13Hw6mI3.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Local\Temp\13Hw6mI3.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    480.3MB

    MD5

    62dd30ce97fe560cc064b669b58552ae

    SHA1

    959f739cd2f586179982a9f475dca1e9f7fef536

    SHA256

    ad5486b6e49a4118dff876561bf43e9ae9978845a9ae74eaa71be58bcc1ce11c

    SHA512

    76eb35202c0cfa27c1c71dde2b983eca08dae3150583a097986dca912aa9b239a08d3d0b5bccd2e6a0ca3ffc23ad9559a02a9f7164afb7dabcc7916a4695f470

  • \Users\Admin\AppData\LocalLow\mozglue.dll

    Filesize

    612KB

    MD5

    f07d9977430e762b563eaadc2b94bbfa

    SHA1

    da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

    SHA256

    4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

    SHA512

    6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

  • \Users\Admin\AppData\LocalLow\nss3.dll

    Filesize

    1.9MB

    MD5

    f67d08e8c02574cbc2f1122c53bfb976

    SHA1

    6522992957e7e4d074947cad63189f308a80fcf2

    SHA256

    c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

    SHA512

    2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

  • \Users\Admin\AppData\LocalLow\sqlite3.dll

    Filesize

    1.0MB

    MD5

    dbf4f8dcefb8056dc6bae4b67ff810ce

    SHA1

    bbac1dd8a07c6069415c04b62747d794736d0689

    SHA256

    47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

    SHA512

    b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

  • \Users\Admin\AppData\Local\Temp\13Hw6mI3.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • \Users\Admin\AppData\Local\Temp\13Hw6mI3.exe

    Filesize

    4.0MB

    MD5

    feccda803ece2e7a3b7e9798714ad47e

    SHA1

    e97182adccf8a7692e6ad2614b0fb7fd3898a1a2

    SHA256

    14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320

    SHA512

    dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    350.5MB

    MD5

    7218803886e9905bf39a16c0aa29f32e

    SHA1

    f3c4b7b7c7254b3bd9f249c40e95058762721fab

    SHA256

    cf7c9a7d8d0faab1bc12a48a920a4b5879d9fdad2a02c1f2f65a75bcc2e0a9b3

    SHA512

    3ab01bca9c2eee012d792d1f44a302fe9303b73a9c3b22ef0e1a54d1ad17c5ad0d13a847119bb3834cc22d81bd5b0e318be9b5429be09679c44ca8ff8f4eb00a

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    408.2MB

    MD5

    8d8e7dcc70b96bcb1397b938ddf0227e

    SHA1

    751a66b1368c1d0218c48365db13d7863268db72

    SHA256

    9b8c4f7cb4100dc246a997ea94f718d5b85f4aa2b6bff79345eae8fa2bf520c3

    SHA512

    474faefab340ad5a25296b84a9081988a5e427938a8b1569a2c3138b3510f406759b62596e26817cefca7ec240d11d00d249234396b9aa115d608e6408e12b3d

  • memory/1996-58-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1996-60-0x0000000000400000-0x0000000000E8B000-memory.dmp

    Filesize

    10.5MB

  • memory/1996-59-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1996-57-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1996-56-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1996-86-0x0000000061E00000-0x0000000061EF1000-memory.dmp

    Filesize

    964KB

  • memory/1996-55-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1996-54-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB