Analysis

  • max time kernel
    299s
  • max time network
    265s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-07-2023 04:49

General

  • Target

    6c409b3b0df0aa505ee678977b9af11b28a4456ca73c6fa99be6b30d31849dac.exe

  • Size

    6.2MB

  • MD5

    c1bdc48d24699fd1d43938a3f32fa7fd

  • SHA1

    08bdc9543146ea0f16d32237cca2c4446f9b3a80

  • SHA256

    6c409b3b0df0aa505ee678977b9af11b28a4456ca73c6fa99be6b30d31849dac

  • SHA512

    80bf4c3c2f8face2432d0ebee8ae0982efc2e576dd5f0898fdff434927a6ad6079c793e5cd75835e4cfbd9f1ad831882c625e1df89893c69488a469f5e81eecf

  • SSDEEP

    196608:OgvS7Syd4AnGKG3ZWQm1f6c2kjWNM69UWr:Pa7HFnGhkd1f6c2kjR6+Wr

Malware Config

Extracted

Family

laplas

C2

http://185.209.161.89

Attributes
  • api_key

    6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c409b3b0df0aa505ee678977b9af11b28a4456ca73c6fa99be6b30d31849dac.exe
    "C:\Users\Admin\AppData\Local\Temp\6c409b3b0df0aa505ee678977b9af11b28a4456ca73c6fa99be6b30d31849dac.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    730.2MB

    MD5

    9ec970bd9de18a3e8444622f631d1a80

    SHA1

    89448e278e5c60203d4157e2d90caf483334053c

    SHA256

    05e1699f40528e22098baff570d6d8d4ee178ec67cde0b24076a7c7ab0e76710

    SHA512

    b3e817a5459754616693a68a707b39082fc6fc662ace50648deef2440aa5091b94b365677d1c2f5d4f095669975e4455a573d3819f27b024b55d4996fd00c221

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    730.2MB

    MD5

    9ec970bd9de18a3e8444622f631d1a80

    SHA1

    89448e278e5c60203d4157e2d90caf483334053c

    SHA256

    05e1699f40528e22098baff570d6d8d4ee178ec67cde0b24076a7c7ab0e76710

    SHA512

    b3e817a5459754616693a68a707b39082fc6fc662ace50648deef2440aa5091b94b365677d1c2f5d4f095669975e4455a573d3819f27b024b55d4996fd00c221

  • memory/4452-170-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-171-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-186-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-185-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-155-0x00007FFC9AA30000-0x00007FFC9AC0B000-memory.dmp

    Filesize

    1.9MB

  • memory/4452-154-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-183-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-182-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-181-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-180-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-179-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-178-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-177-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-176-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-175-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-174-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-173-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-142-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-172-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-144-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-145-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-146-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-147-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-148-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-149-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-150-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-152-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-153-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-184-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-169-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-156-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-157-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-158-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-159-0x00007FFC9AA30000-0x00007FFC9AC0B000-memory.dmp

    Filesize

    1.9MB

  • memory/4452-160-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-161-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-163-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-164-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-165-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-166-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-167-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4452-168-0x0000000001240000-0x0000000001E6C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-124-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-123-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-132-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-133-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-140-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-121-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-122-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-120-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-135-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-136-0x00007FFC9AA30000-0x00007FFC9AC0B000-memory.dmp

    Filesize

    1.9MB

  • memory/4780-143-0x00007FFC9AA30000-0x00007FFC9AC0B000-memory.dmp

    Filesize

    1.9MB

  • memory/4780-131-0x00007FFC9AA30000-0x00007FFC9AC0B000-memory.dmp

    Filesize

    1.9MB

  • memory/4780-130-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-129-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-128-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-127-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-125-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB

  • memory/4780-126-0x0000000000920000-0x000000000154C000-memory.dmp

    Filesize

    12.2MB