Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2023 22:06

General

  • Target

    11c3e7a62b3e78c6ec720aea618bf0a3854ad42535f888532c3e206f3724db4c.exe

  • Size

    4.0MB

  • MD5

    3258deefff3ca70f3dfa3e67067ca611

  • SHA1

    a28ec103c22b03f381dd72073cf620b11881b7b7

  • SHA256

    11c3e7a62b3e78c6ec720aea618bf0a3854ad42535f888532c3e206f3724db4c

  • SHA512

    541eec13adbb3afcc6ee0cfea2d1ddd71036a0da9be5fe6919a2becca5dc23089754d2e5bfd15886cd8e3981f982e40d28bb467132cfdf04844d930ca612b3b8

  • SSDEEP

    98304:kIk6g0kDf8CFjiD+THrrTfmqWAfheTYC521KuM96+/xnVA:3K0skC1k+THrrTf/c5ekwgVA

Malware Config

Extracted

Family

laplas

C2

http://206.189.229.43

Attributes
  • api_key

    f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11c3e7a62b3e78c6ec720aea618bf0a3854ad42535f888532c3e206f3724db4c.exe
    "C:\Users\Admin\AppData\Local\Temp\11c3e7a62b3e78c6ec720aea618bf0a3854ad42535f888532c3e206f3724db4c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:4300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    825.0MB

    MD5

    b89d2072a0df7ca77c42b1b17bffb6fb

    SHA1

    a6aadef7a88357e2923f352980781ec9e3e563df

    SHA256

    53e1ec6404a33d46a289b712c61832df91ca045c4316ba79bba82adba4629fc6

    SHA512

    44a621842a2ce33a8606d95c4cef6893746e3b559af5bba4fdd122bfca55a0144fca281f9cec5e736939f8ac37965684f2487fef1d8df43274b7c5db19cdbf22

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    825.0MB

    MD5

    b89d2072a0df7ca77c42b1b17bffb6fb

    SHA1

    a6aadef7a88357e2923f352980781ec9e3e563df

    SHA256

    53e1ec6404a33d46a289b712c61832df91ca045c4316ba79bba82adba4629fc6

    SHA512

    44a621842a2ce33a8606d95c4cef6893746e3b559af5bba4fdd122bfca55a0144fca281f9cec5e736939f8ac37965684f2487fef1d8df43274b7c5db19cdbf22

  • memory/2600-143-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-144-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-137-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-139-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-138-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-140-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-141-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-142-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-156-0x00007FFAB8C90000-0x00007FFAB8E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2600-136-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-145-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-147-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-148-0x00007FFAB8C90000-0x00007FFAB8E85000-memory.dmp

    Filesize

    2.0MB

  • memory/2600-149-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-135-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-133-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-152-0x00000000008E0000-0x0000000001223000-memory.dmp

    Filesize

    9.3MB

  • memory/2600-134-0x00007FFAB8C90000-0x00007FFAB8E85000-memory.dmp

    Filesize

    2.0MB

  • memory/4300-160-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-169-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-158-0x00007FFAB8C90000-0x00007FFAB8E85000-memory.dmp

    Filesize

    2.0MB

  • memory/4300-159-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-154-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-161-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-162-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-163-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-164-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-165-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-166-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-167-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-168-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-157-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-170-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-171-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-172-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-173-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-175-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-176-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-177-0x00007FFAB8C90000-0x00007FFAB8E85000-memory.dmp

    Filesize

    2.0MB

  • memory/4300-178-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-179-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-180-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-181-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-182-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-183-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB

  • memory/4300-184-0x00000000001D0000-0x0000000000B13000-memory.dmp

    Filesize

    9.3MB