Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 15:38

General

  • Target

    f022037056b50b4baf5db8ba0a437494662dc93cee9421ed12471e14a58a0d50_JC.exe

  • Size

    1.8MB

  • MD5

    ec8952a8dcbbfaa1fb6fda23df851402

  • SHA1

    4fb7a97221090f3a4ff5263103623da165624881

  • SHA256

    f022037056b50b4baf5db8ba0a437494662dc93cee9421ed12471e14a58a0d50

  • SHA512

    33ce0a6ae2929145d75aceee5ab7ca6256c8a630ecb04f8df4addab02541b74c6a350a210cd5426466bf254699b76d8b77259b9bf969a131ca292d9d372d7ffd

  • SSDEEP

    49152:N4o1Bkql93ztp3vKhV2E8rf/L0ZNo2gV6UlAo7TWJ:N4o1Bb73ztVv5Ei0ZTUX7Y

Malware Config

Extracted

Family

laplas

C2

http://clipper.guru

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f022037056b50b4baf5db8ba0a437494662dc93cee9421ed12471e14a58a0d50_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\f022037056b50b4baf5db8ba0a437494662dc93cee9421ed12471e14a58a0d50_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    314.5MB

    MD5

    f1afe31319dc5896890fb9fb27d85fa8

    SHA1

    2d957077ad4c494f7724bfa73866e5a5328818fe

    SHA256

    43d1306f6383d117fdbe7d436e8c5c4dd7990e31061587a40375cc392cf4601b

    SHA512

    922268c51be8faf0dd5890c4c1285a530269077c449ff99eee4f469ef875fa425763ddad67fff806b72c24bb9960ab1491f0ecf13d892b3ed423c7670a8071e2

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    325.4MB

    MD5

    6508a8d69541bbc06f14af374184f78a

    SHA1

    4ffa56cfe8e970ebebe4dc93747e518d921d00c1

    SHA256

    5fd6a5c43a551c723a295f3321f9c01be83f68b29ec9553e98a28e5717c142ab

    SHA512

    96209fc2184119461c05dc3cc43c3bdeb537dd0fc2ebebbf74c72a87d5530f93940f4045fd4d95a19da537057b5bcfe9064ec5ffa56ca7eeacb32e07cb9ef160

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    302.9MB

    MD5

    fed7c6e67d362ff827c52805c95abde3

    SHA1

    fdecb7e928debe0f5ce1849a49b42084b5aa214e

    SHA256

    ca9f7f1954bd52c5d093cce0dc63c42e7280619954da44a65d88db7afd2adcfb

    SHA512

    7d471a3c0ee17d73dc85f71cffda5742ebbcaa7c68a2f72dada3c26d099c7cdbd60f0560bda4e00bebb1af71f574a396f1d6794cece33ace4a0bdbb9f614a85b

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    313.2MB

    MD5

    3f3dbc06119168c123327e14e98eda44

    SHA1

    b97fd8e41990452ab910a41ccc17dd9a47784b0a

    SHA256

    6ea6a32b474717e10555c54a1b0a198766a9a004e70d08c548617ffd4109c1c8

    SHA512

    1e97e19d332187bd7944a69a444f4a357608395875b69d6538b349450582ce8531b92ee27646a26c88206f94038bb7a3f0c12f4ed610eb8c78768f0a289aa712

  • memory/940-0-0x0000000003E10000-0x0000000003FBA000-memory.dmp

    Filesize

    1.7MB

  • memory/940-1-0x0000000003FC0000-0x0000000004390000-memory.dmp

    Filesize

    3.8MB

  • memory/940-2-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/940-3-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/940-5-0x0000000003E10000-0x0000000003FBA000-memory.dmp

    Filesize

    1.7MB

  • memory/940-6-0x0000000003FC0000-0x0000000004390000-memory.dmp

    Filesize

    3.8MB

  • memory/940-14-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/940-15-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-16-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-17-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-19-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-22-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-23-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-24-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-25-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-27-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-28-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-29-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-30-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB

  • memory/2300-31-0x0000000000400000-0x00000000025C4000-memory.dmp

    Filesize

    33.8MB