Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 02:39

General

  • Target

    UD094I8g.exe

  • Size

    25.7MB

  • MD5

    ec9598150d9cdcc100cc3d741f4074b6

  • SHA1

    eeec6007d96fb3ea4d47e8fdff39df4dff78a03c

  • SHA256

    78362eb5c4529001a3bc7ecab62b904afef81c63b6778ba00b99eb3398140dab

  • SHA512

    0f90cb187b42b93ea31474260de8966cdd7a7f80f20dd73b3dca6b8ec2340ab518d88aee61f9c914041d0ac14047d55a20885e82029f3eef843085e38d806a2f

  • SSDEEP

    196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf

Malware Config

Extracted

Family

laplas

C2

http://85.192.40.252

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe
    "C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
      "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    751.7MB

    MD5

    dc2f358ef76fc1a6a8f2fdc8d4b0446e

    SHA1

    1cc0408d1a38d29d8cd0bc2025bc6356375caad7

    SHA256

    b2f0db59fba44dccbda5d250b19b99f4eec4150de98610a60db202f443b22f96

    SHA512

    f6332662be6dfa586bd6e64d08f65fe233da9482fc7c822cc6799ddb62da3516ebfb7e4017129cad8efde2888249efabbbf8bdc5d2dd1ca909066c5d24b8896c

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    751.7MB

    MD5

    dc2f358ef76fc1a6a8f2fdc8d4b0446e

    SHA1

    1cc0408d1a38d29d8cd0bc2025bc6356375caad7

    SHA256

    b2f0db59fba44dccbda5d250b19b99f4eec4150de98610a60db202f443b22f96

    SHA512

    f6332662be6dfa586bd6e64d08f65fe233da9482fc7c822cc6799ddb62da3516ebfb7e4017129cad8efde2888249efabbbf8bdc5d2dd1ca909066c5d24b8896c

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    739.2MB

    MD5

    8be8a1361c38c424e171a931f4717738

    SHA1

    d8bdd53084fb54999ec3ff4ba6edd29e712b3933

    SHA256

    691dfd072ab4a007b8bb62d8182e64eaf5d4deba6a82829d2d07796b2b79a1b8

    SHA512

    2dcbd9d279157340f33205dde6a32217bd0747c207ce97c38bcb64b5d8ef8b0a64a0ce6a88b74ff78989997de35aa82925cd24f876e62526c07b17f02da6616d

  • memory/1832-133-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

    Filesize

    4KB

  • memory/1832-134-0x0000000000400000-0x0000000000D00000-memory.dmp

    Filesize

    9.0MB

  • memory/3536-145-0x0000000000D80000-0x0000000000D81000-memory.dmp

    Filesize

    4KB

  • memory/3536-146-0x0000000000400000-0x0000000000D00000-memory.dmp

    Filesize

    9.0MB