Analysis
-
max time kernel
135s -
max time network
85s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
18-05-2021 09:55
Static task
static1
Behavioral task
behavioral1
Sample
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe
Resource
win7v20210408
General
-
Target
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe
-
Size
2.7MB
-
MD5
4db32a31b88adc5bc8148cb870341e22
-
SHA1
3c2ed928dce81f21baa9461eed865ae8d5235517
-
SHA256
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33
-
SHA512
5eb34d89d94b28789a60f1e57cded29c447d65e197c3c53cbf84362a9fd688441e45023a158844ef98eaf39d2c9fdf0e64f0f8992dcbb164a2284400d7082e83
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
kbd101a.module.exepid process 1032 kbd101a.module.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.module.exe upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.module.exe upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.module.exe upx -
Processes:
resource yara_rule behavioral1/memory/1120-61-0x0000000000A30000-0x0000000000FCD000-memory.dmp vmprotect behavioral1/memory/1780-65-0x0000000000A30000-0x0000000000FCD000-memory.dmp vmprotect behavioral1/memory/1692-79-0x0000000000A30000-0x0000000000FCD000-memory.dmp vmprotect behavioral1/memory/1728-91-0x0000000000A30000-0x0000000000FCD000-memory.dmp vmprotect -
Loads dropped DLL 4 IoCs
Processes:
kbd101a.exepid process 1780 kbd101a.exe 1780 kbd101a.exe 1780 kbd101a.exe 1780 kbd101a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
kbd101a.exekbd101a.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ kbd101a.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ kbd101a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exekbd101a.exekbd101a.exekbd101a.exepid process 1120 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 1780 kbd101a.exe 1692 kbd101a.exe 1728 kbd101a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
kbd101a.exef0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\winmgmts:\localhost\ kbd101a.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exekbd101a.exekbd101a.exekbd101a.exepid process 1120 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 1780 kbd101a.exe 1780 kbd101a.exe 1692 kbd101a.exe 1728 kbd101a.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exepid process 1120 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
kbd101a.module.exedescription pid process Token: SeRestorePrivilege 1032 kbd101a.module.exe Token: 35 1032 kbd101a.module.exe Token: SeSecurityPrivilege 1032 kbd101a.module.exe Token: SeSecurityPrivilege 1032 kbd101a.module.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exekbd101a.exetaskeng.exedescription pid process target process PID 1120 wrote to memory of 1780 1120 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe kbd101a.exe PID 1120 wrote to memory of 1780 1120 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe kbd101a.exe PID 1120 wrote to memory of 1780 1120 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe kbd101a.exe PID 1120 wrote to memory of 1780 1120 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe kbd101a.exe PID 1780 wrote to memory of 1032 1780 kbd101a.exe kbd101a.module.exe PID 1780 wrote to memory of 1032 1780 kbd101a.exe kbd101a.module.exe PID 1780 wrote to memory of 1032 1780 kbd101a.exe kbd101a.module.exe PID 1780 wrote to memory of 1032 1780 kbd101a.exe kbd101a.module.exe PID 1848 wrote to memory of 1692 1848 taskeng.exe kbd101a.exe PID 1848 wrote to memory of 1692 1848 taskeng.exe kbd101a.exe PID 1848 wrote to memory of 1692 1848 taskeng.exe kbd101a.exe PID 1848 wrote to memory of 1692 1848 taskeng.exe kbd101a.exe PID 1780 wrote to memory of 916 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 916 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 916 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 916 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1704 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1704 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1704 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1704 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1120 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1120 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1120 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1120 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1576 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1576 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1576 1780 kbd101a.exe attrib.exe PID 1780 wrote to memory of 1576 1780 kbd101a.exe attrib.exe PID 1848 wrote to memory of 1728 1848 taskeng.exe kbd101a.exe PID 1848 wrote to memory of 1728 1848 taskeng.exe kbd101a.exe PID 1848 wrote to memory of 1728 1848 taskeng.exe kbd101a.exe PID 1848 wrote to memory of 1728 1848 taskeng.exe kbd101a.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 1704 attrib.exe 1120 attrib.exe 1576 attrib.exe 916 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe"C:\Users\Admin\AppData\Local\Temp\f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exe2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\ENU_687FE97D0543F71E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc"3⤵
- Views/modifies file attributes
PID:916
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc"3⤵
- Views/modifies file attributes
PID:1704
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc"3⤵
- Views/modifies file attributes
PID:1120
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc"3⤵
- Views/modifies file attributes
PID:1576
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3CF6321E-CCCD-4BE9-AFAC-2D4FAADE8A93} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exe2⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exe2⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
645432012930d65dc8efb0afc67fdb7b
SHA14f5baafb1001c4167a6dc55635a0720089f5a791
SHA25608e8a1f525ad4fab8c1ec9c9c08efb7bf78a77d12a743d664cb10777eef9afeb
SHA5126156b6dc453d36d603ac762d6248039aa5f38a31dc4fd4e1ad8493878a4f605fedcf7c3e2e4194da7f9e94193c5be9e3936e927dd34302171aeb59b9fc578020
-
MD5
c995c9a24962eabe84a758ba94ac7c45
SHA199bad45bf1e295a69ef7122c6a9afd836f891159
SHA256961655ea27ee29e084669c9b43f6cc56415fbcff08b5a409e0f9e688063e23fa
SHA512245d0cfa41224a023586313d150d21e3a262fef96fbc16ae251e9bbc56786f77ab8c746f6cf025367d268fcb0a1312d76c72004bba9bc693d983f1e285aec4ea
-
MD5
946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
MD5
946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
MD5
946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.sqlite3.module.dll
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.sqlite3.module.dll
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02