Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 15:04

General

  • Target

    09327699.exe

  • Size

    25.7MB

  • MD5

    ec9598150d9cdcc100cc3d741f4074b6

  • SHA1

    eeec6007d96fb3ea4d47e8fdff39df4dff78a03c

  • SHA256

    78362eb5c4529001a3bc7ecab62b904afef81c63b6778ba00b99eb3398140dab

  • SHA512

    0f90cb187b42b93ea31474260de8966cdd7a7f80f20dd73b3dca6b8ec2340ab518d88aee61f9c914041d0ac14047d55a20885e82029f3eef843085e38d806a2f

  • SSDEEP

    196608:HW36QOxQ8JEgOpcqGs4anqH4mJsMQOgKmEiTBh:S63Q8JExpIGnqYxMNmEiTf

Malware Config

Extracted

Family

laplas

C2

http://85.192.40.252

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09327699.exe
    "C:\Users\Admin\AppData\Local\Temp\09327699.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
      "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    726.7MB

    MD5

    a932d4d99f998664c53aa72028e66fd6

    SHA1

    cebc7acb053012167de21bb3c96a762fea94d1ad

    SHA256

    f79efb386bfb0899b19f361199805e83bd86164d67cbaaa8c477ae9d9d86d58b

    SHA512

    f3d383685a2b52af80c9146c59da485c1ca0995776bdffc9b4c7cbd1044d27d90827a0bfb4af7078825e553f0987553695b38455804ac29e37a076ab85e1796d

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    726.7MB

    MD5

    a932d4d99f998664c53aa72028e66fd6

    SHA1

    cebc7acb053012167de21bb3c96a762fea94d1ad

    SHA256

    f79efb386bfb0899b19f361199805e83bd86164d67cbaaa8c477ae9d9d86d58b

    SHA512

    f3d383685a2b52af80c9146c59da485c1ca0995776bdffc9b4c7cbd1044d27d90827a0bfb4af7078825e553f0987553695b38455804ac29e37a076ab85e1796d

  • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

    Filesize

    726.7MB

    MD5

    a932d4d99f998664c53aa72028e66fd6

    SHA1

    cebc7acb053012167de21bb3c96a762fea94d1ad

    SHA256

    f79efb386bfb0899b19f361199805e83bd86164d67cbaaa8c477ae9d9d86d58b

    SHA512

    f3d383685a2b52af80c9146c59da485c1ca0995776bdffc9b4c7cbd1044d27d90827a0bfb4af7078825e553f0987553695b38455804ac29e37a076ab85e1796d

  • memory/652-145-0x0000000000F60000-0x0000000000F61000-memory.dmp

    Filesize

    4KB

  • memory/652-146-0x0000000000400000-0x0000000000D00000-memory.dmp

    Filesize

    9.0MB

  • memory/4424-133-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

    Filesize

    4KB

  • memory/4424-134-0x0000000000400000-0x0000000000D00000-memory.dmp

    Filesize

    9.0MB