Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 13:23

General

  • Target

    UD094I8g.exe

  • Size

    25.7MB

  • MD5

    ec9598150d9cdcc100cc3d741f4074b6

  • SHA1

    eeec6007d96fb3ea4d47e8fdff39df4dff78a03c

  • SHA256

    78362eb5c4529001a3bc7ecab62b904afef81c63b6778ba00b99eb3398140dab

  • SHA512

    0f90cb187b42b93ea31474260de8966cdd7a7f80f20dd73b3dca6b8ec2340ab518d88aee61f9c914041d0ac14047d55a20885e82029f3eef843085e38d806a2f

  • SSDEEP

    196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf

Malware Config

Extracted

Family

laplas

C2

http://85.192.40.252

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe
    "C:\Users\Admin\AppData\Local\Temp\UD094I8g.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
      "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    737.7MB

    MD5

    8a8a94459bd03ed354eb3b372fbdd718

    SHA1

    5db25ddf0af836306d109b65a8ba15c39ade92a6

    SHA256

    314e03b9975dde4a56a12a49fd96e548cb3b66332cf81a87e9c55fa33ac2a206

    SHA512

    9fe46dc81b2e2bcaba3bf7d4d4b97c4510b4d52cbfd5d4256c026c6544fd826a894b3050b0bfa0204a955179ed52482762440446c012eba16f6bd08bed9c3701

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    691.8MB

    MD5

    58c967a451976c09717e98ddfdd0d824

    SHA1

    d88f153f81c25a3c75ca9918873fcf50656226ed

    SHA256

    cd4e5bb91c9aa0e2ba5b0163d7784db2a7ee7cf26ae13e92fe694f205817fa15

    SHA512

    ebb72d8fa130b176569d4d35538e57f1ad0cff77a149bd3ea4644df0fb4a4f0d73b8771131deead29fdea1816917dd2ad09ddc0b71e5a8072fe9ae0ca1231a01

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    665.4MB

    MD5

    674a6049f0aa4ab5efe280d8b68c35b6

    SHA1

    1fed92722fe431629f3ec428555b81504de2dc1a

    SHA256

    456d50c223ec7a3ee1f62e5387624e419ce70a573d37b7f9b6b8adf5bd89f040

    SHA512

    b174bda875d5285d53a460005181829a495bce5719f6f36375cd874fa7f1ace602538a79f6ed573f014bea6ce61ac39ff45bc7982f3196110ef000152a85dfd3

  • memory/2420-145-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/2420-146-0x0000000000400000-0x0000000000D00000-memory.dmp

    Filesize

    9.0MB

  • memory/4420-133-0x0000000000E50000-0x0000000000E51000-memory.dmp

    Filesize

    4KB

  • memory/4420-134-0x0000000000400000-0x0000000000D00000-memory.dmp

    Filesize

    9.0MB