Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2023 07:25

General

  • Target

    062fe47e8efc9041880ed273eda7c8f3.exe

  • Size

    3.5MB

  • MD5

    062fe47e8efc9041880ed273eda7c8f3

  • SHA1

    b77fffa5fce64689758a7180477ffa25bd62f509

  • SHA256

    589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

  • SHA512

    67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

  • SSDEEP

    98304:Qs1IP7M+tBbnp5KsWEjGnT6iWB7cXWvdeMl+0WyC6oxgfMapH:VoA+3n7KsWEQTUqX8dedyXw2pH

Malware Config

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\062fe47e8efc9041880ed273eda7c8f3.exe
    "C:\Users\Admin\AppData\Local\Temp\062fe47e8efc9041880ed273eda7c8f3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    768.5MB

    MD5

    b1bdfa529351d483be6e500f4b9ca278

    SHA1

    f2750a98edcc1987bb239fba4e289ef796cfa5ac

    SHA256

    20a544b7f355869ad3d938a0cf707036b51d626b6b6c2277a30c9ac17af5a2ea

    SHA512

    508e11a6820ac11a23c1e6140ecb30df81e4e43c920d5d60d200823717595b2f4077e64df35a1d2604bbc612d642c5ccabb51b5d252e76186304e5f1f7edd4bf

  • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    768.5MB

    MD5

    b1bdfa529351d483be6e500f4b9ca278

    SHA1

    f2750a98edcc1987bb239fba4e289ef796cfa5ac

    SHA256

    20a544b7f355869ad3d938a0cf707036b51d626b6b6c2277a30c9ac17af5a2ea

    SHA512

    508e11a6820ac11a23c1e6140ecb30df81e4e43c920d5d60d200823717595b2f4077e64df35a1d2604bbc612d642c5ccabb51b5d252e76186304e5f1f7edd4bf

  • memory/1744-0-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-1-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1744-2-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1744-3-0x0000000077550000-0x00000000776F9000-memory.dmp

    Filesize

    1.7MB

  • memory/1744-5-0x000007FE80010000-0x000007FE80011000-memory.dmp

    Filesize

    4KB

  • memory/1744-4-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-7-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-6-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/1744-8-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-9-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-10-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-11-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-12-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-13-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-14-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-15-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-16-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1744-17-0x0000000077550000-0x00000000776F9000-memory.dmp

    Filesize

    1.7MB

  • memory/1744-18-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-25-0x00000000288A0000-0x0000000029138000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-24-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/1744-23-0x0000000000FA0000-0x0000000001838000-memory.dmp

    Filesize

    8.6MB

  • memory/1744-26-0x0000000077550000-0x00000000776F9000-memory.dmp

    Filesize

    1.7MB

  • memory/2304-27-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-28-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/2304-29-0x00000000000E0000-0x00000000000E1000-memory.dmp

    Filesize

    4KB

  • memory/2304-30-0x0000000077550000-0x00000000776F9000-memory.dmp

    Filesize

    1.7MB

  • memory/2304-31-0x000007FE80010000-0x000007FE80011000-memory.dmp

    Filesize

    4KB

  • memory/2304-32-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-33-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-35-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-34-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-36-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-37-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-38-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-39-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-40-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-41-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-42-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-43-0x000007FEFD6C0000-0x000007FEFD72C000-memory.dmp

    Filesize

    432KB

  • memory/2304-44-0x0000000077550000-0x00000000776F9000-memory.dmp

    Filesize

    1.7MB

  • memory/2304-45-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-46-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-47-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-48-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-49-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-50-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-53-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-54-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-55-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-56-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-57-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB

  • memory/2304-58-0x0000000000CE0000-0x0000000001578000-memory.dmp

    Filesize

    8.6MB