Analysis
-
max time kernel
124s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 17:58
Static task
static1
Behavioral task
behavioral1
Sample
02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe
Resource
win7-20220414-en
General
-
Target
02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe
-
Size
16.3MB
-
MD5
d2f5c4c26e6039925b92a079a6675e62
-
SHA1
e2d4603cbcbc35bac6911d340c2507149c7586a8
-
SHA256
02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff
-
SHA512
59c3b1b8fc27170b1c46edeeeef8db29c57a8a0831413a57e7e090051ee77f283b3a42e88de8178e7bb6ba0f9c49fc5aeef613056bee9ffa2d26fc362a68bd9e
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.sqlite3.module.dll acprotect -
Executes dropped EXE 6 IoCs
Processes:
Build.exeextrimhack_04.07.2019_.exetwinui.exetwinui.module.exetwinui.exetwinui.exepid process 1084 Build.exe 2000 extrimhack_04.07.2019_.exe 1724 twinui.exe 1460 twinui.module.exe 1900 twinui.exe 1148 twinui.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.module.exe upx C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.module.exe upx \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.module.exe upx -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\extrimhack_04.07.2019_.exe vmprotect \Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\extrimhack_04.07.2019_.exe vmprotect \Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\extrimhack_04.07.2019_.exe vmprotect C:\Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\extrimhack_04.07.2019_.exe vmprotect -
Loads dropped DLL 11 IoCs
Processes:
02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exetwinui.exepid process 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe 1724 twinui.exe 1724 twinui.exe 1724 twinui.exe 1724 twinui.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ipapi.co 8 ipapi.co -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe autoit_exe \Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe autoit_exe \Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe autoit_exe \Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe autoit_exe C:\Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe autoit_exe C:\Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe autoit_exe C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exe autoit_exe C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exe autoit_exe C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exe autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
twinui.exetwinui.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ twinui.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ twinui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
Build.exetwinui.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ Build.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\winmgmts:\localhost\ twinui.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
twinui.exepid process 1724 twinui.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
twinui.module.exedescription pid process Token: SeRestorePrivilege 1460 twinui.module.exe Token: 35 1460 twinui.module.exe Token: SeSecurityPrivilege 1460 twinui.module.exe Token: SeSecurityPrivilege 1460 twinui.module.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exeBuild.exetwinui.exetaskeng.exedescription pid process target process PID 1944 wrote to memory of 1084 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe Build.exe PID 1944 wrote to memory of 1084 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe Build.exe PID 1944 wrote to memory of 1084 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe Build.exe PID 1944 wrote to memory of 1084 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe Build.exe PID 1944 wrote to memory of 2000 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe extrimhack_04.07.2019_.exe PID 1944 wrote to memory of 2000 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe extrimhack_04.07.2019_.exe PID 1944 wrote to memory of 2000 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe extrimhack_04.07.2019_.exe PID 1944 wrote to memory of 2000 1944 02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe extrimhack_04.07.2019_.exe PID 1084 wrote to memory of 1724 1084 Build.exe twinui.exe PID 1084 wrote to memory of 1724 1084 Build.exe twinui.exe PID 1084 wrote to memory of 1724 1084 Build.exe twinui.exe PID 1084 wrote to memory of 1724 1084 Build.exe twinui.exe PID 1724 wrote to memory of 1460 1724 twinui.exe twinui.module.exe PID 1724 wrote to memory of 1460 1724 twinui.exe twinui.module.exe PID 1724 wrote to memory of 1460 1724 twinui.exe twinui.module.exe PID 1724 wrote to memory of 1460 1724 twinui.exe twinui.module.exe PID 1724 wrote to memory of 1496 1724 twinui.exe attrib.exe PID 1724 wrote to memory of 1496 1724 twinui.exe attrib.exe PID 1724 wrote to memory of 1496 1724 twinui.exe attrib.exe PID 1724 wrote to memory of 1496 1724 twinui.exe attrib.exe PID 1212 wrote to memory of 1900 1212 taskeng.exe twinui.exe PID 1212 wrote to memory of 1900 1212 taskeng.exe twinui.exe PID 1212 wrote to memory of 1900 1212 taskeng.exe twinui.exe PID 1212 wrote to memory of 1900 1212 taskeng.exe twinui.exe PID 1212 wrote to memory of 1148 1212 taskeng.exe twinui.exe PID 1212 wrote to memory of 1148 1212 taskeng.exe twinui.exe PID 1212 wrote to memory of 1148 1212 taskeng.exe twinui.exe PID 1212 wrote to memory of 1148 1212 taskeng.exe twinui.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe"C:\Users\Admin\AppData\Local\Temp\02c61c0cd23dcc382fd40aff99bbd896c04aaca7fae91f2fbe4a66ea7abf60ff.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe"C:\Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\Build.exe"2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ENU_687FE975325E824E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\*"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"4⤵
- Views/modifies file attributes
PID:1496
-
-
-
-
C:\Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\extrimhack_04.07.2019_.exe"C:\Users\Admin\AppData\Roaming\P5qIcYY2168tU11ez\extrimhack_04.07.2019_.exe"2⤵
- Executes dropped EXE
PID:2000
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A0495830-0553-41C8-ABA8-40D48F37170A} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\twinui.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
13.9MB
MD57fb3cf569a680d1d97cf7109eb6d65a3
SHA1cfd9c29811d4fb54de33dbb9bfcb72a958ccc6bd
SHA256f972027704f00a7c89e80829c7dcb3a131f4d6ccc14d0bb88b68badce98095b7
SHA5120fce8f8906a74c4a26b1decf0f1ad4f5d317a0bd58d745a34d8156b54ea4f4f9bf7950c056d414f1ba9ff34bf883c15408eeab5ed85da96e977abe81d9d07b7f
-
Filesize
3KB
MD51fc575068f5f0d32e4a7d2d5b53677f2
SHA1989c422b627afdb6435103bd085383542942ef63
SHA256f92fe5cce12641a5a59f8cef8ec2b9e245708f7dedef7c6a66264193de9f47b5
SHA512271e3e168a1c83614aca30cb2771a6fe8aae177f5a3586646347ff53077255e6d704c8cfe74189773d75a428185256a443f23b9aebe948884f3d9bfa2264bcc8
-
Filesize
49KB
MD5f2efdd3a8929d2ace753c3dd16fd2dcb
SHA1d83d1d12285e6cf0b0d439ce9aec7b1014f1ba17
SHA2567bc6488132bcb8d8240d9e30e10ffe1d96e74f729ef3570e726d476bbe270df4
SHA5120a6f5f58f262843fa954b1187877018bb660f6661daebf13795f443ada8498ba34e51b6b0f57921f7cfb9ca28588ce36d25022be11d2a075a64f8a58efbcbae9
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
1.8MB
MD57fc2f942a731666fbcbfe41cca252d44
SHA14a9ec57556d61dfb66b1032a0e25c84997633893
SHA2562ea0be1b0a11cc00f4e1a91c3f0d2357de51169d6273638bee546be54e22e6b2
SHA5128d365f721ab46cf9c80efae142e033a7fadab653e23b97201cc00f53dfd269d87b9bc17a16454b9d9be07682970460e94e8e799a598b25c8fd46e15807a66421
-
Filesize
13.9MB
MD57fb3cf569a680d1d97cf7109eb6d65a3
SHA1cfd9c29811d4fb54de33dbb9bfcb72a958ccc6bd
SHA256f972027704f00a7c89e80829c7dcb3a131f4d6ccc14d0bb88b68badce98095b7
SHA5120fce8f8906a74c4a26b1decf0f1ad4f5d317a0bd58d745a34d8156b54ea4f4f9bf7950c056d414f1ba9ff34bf883c15408eeab5ed85da96e977abe81d9d07b7f
-
Filesize
13.9MB
MD57fb3cf569a680d1d97cf7109eb6d65a3
SHA1cfd9c29811d4fb54de33dbb9bfcb72a958ccc6bd
SHA256f972027704f00a7c89e80829c7dcb3a131f4d6ccc14d0bb88b68badce98095b7
SHA5120fce8f8906a74c4a26b1decf0f1ad4f5d317a0bd58d745a34d8156b54ea4f4f9bf7950c056d414f1ba9ff34bf883c15408eeab5ed85da96e977abe81d9d07b7f
-
Filesize
13.9MB
MD57fb3cf569a680d1d97cf7109eb6d65a3
SHA1cfd9c29811d4fb54de33dbb9bfcb72a958ccc6bd
SHA256f972027704f00a7c89e80829c7dcb3a131f4d6ccc14d0bb88b68badce98095b7
SHA5120fce8f8906a74c4a26b1decf0f1ad4f5d317a0bd58d745a34d8156b54ea4f4f9bf7950c056d414f1ba9ff34bf883c15408eeab5ed85da96e977abe81d9d07b7f
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02