Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-07-2023 21:50

General

  • Target

    6bbcf743fa00cfa33aa60a923d319850111d610b44cfdbe1b5dc6c672f177a8f.exe

  • Size

    4.4MB

  • MD5

    24c40e66db640789a022cb839b28d476

  • SHA1

    b6000f4b0e71ce952267e7e5728bc4181877c497

  • SHA256

    6bbcf743fa00cfa33aa60a923d319850111d610b44cfdbe1b5dc6c672f177a8f

  • SHA512

    481240b66ac8eb61b8a9aa6e22e14abdffba7869695c7b92214029a714b619319d3c50bc640e79bf790de309d5a412f4e0fecabc1082acd52d1984c8c8f8f0cd

  • SSDEEP

    98304:/C0+qzz+DpM8iptpFvoyDz8nFEPlSV20WKeaGLjc1TLAOjs5O:K0X2dM8iPpF/Dz8nFSl90WWGLjc1HAOd

Malware Config

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bbcf743fa00cfa33aa60a923d319850111d610b44cfdbe1b5dc6c672f177a8f.exe
    "C:\Users\Admin\AppData\Local\Temp\6bbcf743fa00cfa33aa60a923d319850111d610b44cfdbe1b5dc6c672f177a8f.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    812.4MB

    MD5

    3737da600b0c4d50b858925ccc6980bf

    SHA1

    5e5fed48d438afb12e0b84531ad5ce3602206870

    SHA256

    262abf66960a669f53d2f0491d68e2108066da8b60ef810779cc686f1f4cb689

    SHA512

    3eff6c37651edd9b02ba8250e51b5907022c042f3c9d370ae0fce03618bd000838663fa0f2383a6a67568ed48617793be9fc7498812702491486d3772440b40e

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    812.4MB

    MD5

    3737da600b0c4d50b858925ccc6980bf

    SHA1

    5e5fed48d438afb12e0b84531ad5ce3602206870

    SHA256

    262abf66960a669f53d2f0491d68e2108066da8b60ef810779cc686f1f4cb689

    SHA512

    3eff6c37651edd9b02ba8250e51b5907022c042f3c9d370ae0fce03618bd000838663fa0f2383a6a67568ed48617793be9fc7498812702491486d3772440b40e

  • memory/352-128-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-129-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-124-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-125-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-126-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-127-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-139-0x00007FFCB76A0000-0x00007FFCB787B000-memory.dmp

    Filesize

    1.9MB

  • memory/352-123-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-130-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-131-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-133-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-134-0x00007FFCB76A0000-0x00007FFCB787B000-memory.dmp

    Filesize

    1.9MB

  • memory/352-122-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-121-0x00007FFCB76A0000-0x00007FFCB787B000-memory.dmp

    Filesize

    1.9MB

  • memory/352-137-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/352-120-0x0000000000B80000-0x0000000001472000-memory.dmp

    Filesize

    8.9MB

  • memory/812-143-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-156-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-140-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-142-0x00007FFCB76A0000-0x00007FFCB787B000-memory.dmp

    Filesize

    1.9MB

  • memory/812-144-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-147-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-148-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-149-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-150-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-151-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-153-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-154-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-155-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-141-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-157-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-158-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-160-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-161-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-162-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-163-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-164-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-165-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-166-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB

  • memory/812-167-0x00007FFCB76A0000-0x00007FFCB787B000-memory.dmp

    Filesize

    1.9MB

  • memory/812-168-0x0000000000D60000-0x0000000001652000-memory.dmp

    Filesize

    8.9MB