Analysis
-
max time kernel
124s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe
Resource
win10v2004-en-20220112
General
-
Target
bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe
-
Size
2.3MB
-
MD5
a915fc346ed7e984e794aa9e0d497137
-
SHA1
1590cc249c30218031844e22bfba50a135a9734d
-
SHA256
bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375
-
SHA512
7b95af591e6a54f197a41a34cf3964eb6df85f57dbb658994b29fe3c531f957487cc5c9f6ae126f8f14e05a2ac857c15b528bbc62057b9ee0c53b486a2ba1a9a
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
advpack.module.exepid process 1240 advpack.module.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.module.exe upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.module.exe upx -
Loads dropped DLL 3 IoCs
Processes:
advpack.exepid process 1212 advpack.exe 1212 advpack.exe 1212 advpack.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipapi.co 5 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
advpack.exeadvpack.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ advpack.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ advpack.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
advpack.exebc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\winmgmts:\localhost\ advpack.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
advpack.exepid process 1212 advpack.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exepid process 1696 bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
advpack.module.exedescription pid process Token: SeRestorePrivilege 1240 advpack.module.exe Token: 35 1240 advpack.module.exe Token: SeSecurityPrivilege 1240 advpack.module.exe Token: SeSecurityPrivilege 1240 advpack.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exeadvpack.exetaskeng.exedescription pid process target process PID 1696 wrote to memory of 1212 1696 bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe advpack.exe PID 1696 wrote to memory of 1212 1696 bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe advpack.exe PID 1696 wrote to memory of 1212 1696 bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe advpack.exe PID 1696 wrote to memory of 1212 1696 bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe advpack.exe PID 1212 wrote to memory of 1240 1212 advpack.exe advpack.module.exe PID 1212 wrote to memory of 1240 1212 advpack.exe advpack.module.exe PID 1212 wrote to memory of 1240 1212 advpack.exe advpack.module.exe PID 1212 wrote to memory of 1240 1212 advpack.exe advpack.module.exe PID 1212 wrote to memory of 1548 1212 advpack.exe attrib.exe PID 1212 wrote to memory of 1548 1212 advpack.exe attrib.exe PID 1212 wrote to memory of 1548 1212 advpack.exe attrib.exe PID 1212 wrote to memory of 1548 1212 advpack.exe attrib.exe PID 1828 wrote to memory of 1712 1828 taskeng.exe advpack.exe PID 1828 wrote to memory of 1712 1828 taskeng.exe advpack.exe PID 1828 wrote to memory of 1712 1828 taskeng.exe advpack.exe PID 1828 wrote to memory of 1712 1828 taskeng.exe advpack.exe PID 1828 wrote to memory of 1640 1828 taskeng.exe advpack.exe PID 1828 wrote to memory of 1640 1828 taskeng.exe advpack.exe PID 1828 wrote to memory of 1640 1828 taskeng.exe advpack.exe PID 1828 wrote to memory of 1640 1828 taskeng.exe advpack.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe"C:\Users\Admin\AppData\Local\Temp\bc87f6ec38d359fdd4ddf35c345e4e82dc1235c3fc3e9fbb38df5ff778448375.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\41646D696E565156564F414A4B57494E5F375836.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll"3⤵
- Views/modifies file attributes
PID:1548
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {61FEE486-0C0A-4344-90E8-36F540E580F6} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.exe2⤵
- Drops file in System32 directory
PID:1712
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.exe2⤵
- Drops file in System32 directory
PID:1640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
232462866c5390687e8a1782600d9aeb
SHA1d70ea492e8902bc743977e7e0a7adac5c3538b56
SHA2566bb158dc9b63f4df774008e58ef42c1c2f3a27a18bb1c0bc7cdbcc93a7e15114
SHA5123cfcf4296ddd2867b1b9e0032bd9b31fdb5861e9e6a84b6fbd1ffd2f7bd4ebf54bf7d41235d7fb9c53f1fb8fff39ca551e1e80f84c4547d858623b9058c583cd
-
MD5
bf873cec1cb93c6a31153a44f2bd7386
SHA1dccaa097d5cde6749f7f2ca662e2507e23eb87ff
SHA2560e171cd72e69623177561d067a75ee3494e541a89e86ee58b578aa8d3ed549a3
SHA512a4eca46253c31bb920e198bc927280c4823d0222c045719dbf9bc3d0dda19d923cb1f06f0f118020cdf79a3262b07c234ee5989587251b9286a260c7e2015ad6
-
MD5
965119091c292c96af5011f40dae87a5
SHA185708f7bab07528f1b6e9dfbf64648189a513043
SHA2561ad53eed4d91c6835551aa997399b6054cdf53bca33f103aec24afe46547186b
SHA512244ef9a88308f9a1d738bb1fbf9f6125a4f25ef5665df85adff1985068f92a1d9714785eb63183fede6f1fd9c1420eecfa185a971c99ab835a8f9ea770d94629
-
MD5
965119091c292c96af5011f40dae87a5
SHA185708f7bab07528f1b6e9dfbf64648189a513043
SHA2561ad53eed4d91c6835551aa997399b6054cdf53bca33f103aec24afe46547186b
SHA512244ef9a88308f9a1d738bb1fbf9f6125a4f25ef5665df85adff1985068f92a1d9714785eb63183fede6f1fd9c1420eecfa185a971c99ab835a8f9ea770d94629
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.sqlite3.module.dll
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-m..rds-datacontrol-rll\advpack.sqlite3.module.dll
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c