Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2023 11:16

General

  • Target

    JC_589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344.exe

  • Size

    3.5MB

  • MD5

    062fe47e8efc9041880ed273eda7c8f3

  • SHA1

    b77fffa5fce64689758a7180477ffa25bd62f509

  • SHA256

    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

  • SHA512

    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

  • SSDEEP

    98304:Qs1IP7M+tBbnp5KsWEjGnT6iWB7cXWvdeMl+0WyC6oxgfMapH:VoA+3n7KsWEQTUqX8dedyXw2pH

Malware Config

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JC_589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344.exe
    "C:\Users\Admin\AppData\Local\Temp\JC_589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    836.5MB

    MD5

    0175e6f1c3300858a610c6541be528bb

    SHA1

    d7a61f4b4546bd9a59c4fabdc0fca097f6bd4bb3

    SHA256

    df60eed7036bf9d39407db9fa2aed058ba1cff848111ab64ff0895d939e648be

    SHA512

    6304fb35960536b9e790e5b3b9faeecb5dbaf1414674f925560555fee4d6853b3541e3377b26edf707624b82bf770bda0f4335f948abe7a3408c2b855b0e5971

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    836.5MB

    MD5

    0175e6f1c3300858a610c6541be528bb

    SHA1

    d7a61f4b4546bd9a59c4fabdc0fca097f6bd4bb3

    SHA256

    df60eed7036bf9d39407db9fa2aed058ba1cff848111ab64ff0895d939e648be

    SHA512

    6304fb35960536b9e790e5b3b9faeecb5dbaf1414674f925560555fee4d6853b3541e3377b26edf707624b82bf770bda0f4335f948abe7a3408c2b855b0e5971

  • memory/1672-8-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/1672-5-0x0000000077560000-0x0000000077709000-memory.dmp

    Filesize

    1.7MB

  • memory/1672-15-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-16-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-6-0x000007FE80010000-0x000007FE80011000-memory.dmp

    Filesize

    4KB

  • memory/1672-30-0x0000000077560000-0x0000000077709000-memory.dmp

    Filesize

    1.7MB

  • memory/1672-7-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-9-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-10-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-11-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-12-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-13-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-0-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-3-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1672-4-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1672-17-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-18-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1672-19-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-20-0x0000000077560000-0x0000000077709000-memory.dmp

    Filesize

    1.7MB

  • memory/1672-2-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1672-25-0x0000000028700000-0x0000000028F98000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-27-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1672-28-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1672-26-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/1672-1-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1672-14-0x00000000012B0000-0x0000000001B48000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-29-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-32-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/2640-34-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/2640-33-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/2640-31-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/2640-35-0x0000000077560000-0x0000000077709000-memory.dmp

    Filesize

    1.7MB

  • memory/2640-37-0x000007FE80010000-0x000007FE80011000-memory.dmp

    Filesize

    4KB

  • memory/2640-36-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-38-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-39-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-40-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-41-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-42-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-43-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-44-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-45-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-46-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-47-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/2640-48-0x0000000077560000-0x0000000077709000-memory.dmp

    Filesize

    1.7MB

  • memory/2640-50-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-53-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-54-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-55-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-56-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-57-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-58-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-59-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-60-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-61-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB

  • memory/2640-62-0x0000000001190000-0x0000000001A28000-memory.dmp

    Filesize

    8.6MB