Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-05-2021 09:55
Static task
static1
Behavioral task
behavioral1
Sample
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe
Resource
win7v20210408
General
-
Target
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe
-
Size
2.7MB
-
MD5
4db32a31b88adc5bc8148cb870341e22
-
SHA1
3c2ed928dce81f21baa9461eed865ae8d5235517
-
SHA256
f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33
-
SHA512
5eb34d89d94b28789a60f1e57cded29c447d65e197c3c53cbf84362a9fd688441e45023a158844ef98eaf39d2c9fdf0e64f0f8992dcbb164a2284400d7082e83
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000300000001a50b-122.dat acprotect behavioral2/files/0x000300000001a50b-123.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3052 kbd101a.module.exe -
resource yara_rule behavioral2/files/0x000300000001a50b-122.dat upx behavioral2/files/0x000300000001a50b-123.dat upx behavioral2/files/0x00030000000155f2-127.dat upx behavioral2/files/0x00030000000155f2-128.dat upx -
resource yara_rule behavioral2/memory/3972-114-0x0000000001040000-0x00000000015DD000-memory.dmp vmprotect behavioral2/memory/2752-119-0x0000000001040000-0x00000000015DD000-memory.dmp vmprotect behavioral2/memory/2672-136-0x0000000001040000-0x00000000015DD000-memory.dmp vmprotect behavioral2/memory/3856-138-0x0000000001040000-0x00000000015DD000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
pid Process 2752 kbd101a.exe 2752 kbd101a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ipapi.co 19 ipapi.co -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ kbd101a.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ kbd101a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3972 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 2752 kbd101a.exe 2672 kbd101a.exe 3856 kbd101a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\winmgmts:\localhost\ kbd101a.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3972 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 3972 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 2752 kbd101a.exe 2752 kbd101a.exe 2752 kbd101a.exe 2752 kbd101a.exe 2672 kbd101a.exe 2672 kbd101a.exe 3856 kbd101a.exe 3856 kbd101a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3972 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3052 kbd101a.module.exe Token: 35 3052 kbd101a.module.exe Token: SeSecurityPrivilege 3052 kbd101a.module.exe Token: SeSecurityPrivilege 3052 kbd101a.module.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3972 wrote to memory of 2752 3972 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 75 PID 3972 wrote to memory of 2752 3972 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 75 PID 3972 wrote to memory of 2752 3972 f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe 75 PID 2752 wrote to memory of 3052 2752 kbd101a.exe 78 PID 2752 wrote to memory of 3052 2752 kbd101a.exe 78 PID 2752 wrote to memory of 3052 2752 kbd101a.exe 78 PID 2752 wrote to memory of 1780 2752 kbd101a.exe 80 PID 2752 wrote to memory of 1780 2752 kbd101a.exe 80 PID 2752 wrote to memory of 1780 2752 kbd101a.exe 80 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1780 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe"C:\Users\Admin\AppData\Local\Temp\f0e9e44c5e6baee47e3f6d946155c305c3175c8150d948120b7ca2d393df2a33.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exe2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\ENU_801FE97E4621DA2E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc"3⤵
- Views/modifies file attributes
PID:1780
-
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exe1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-security-ngc-ctnrsvc\kbd101a.exe1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3856