Analysis
-
max time kernel
153s -
max time network
218s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-05-2022 21:09
Static task
static1
Behavioral task
behavioral1
Sample
c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe
Resource
win10v2004-20220414-en
General
-
Target
c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe
-
Size
1.8MB
-
MD5
8f0fd7568d9b36ec7b32b89a7e54a256
-
SHA1
2a682a60381d366bcbabadd58661d6525864752a
-
SHA256
c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb
-
SHA512
799187150e329f5815d72cf4dcc4bdd49e122ede1e8f480255b7ff0d722bb894b919f54a374d3e24019f22fd6f71108cc430fcfe8e664fb583d6be70f354fc89
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.sqlite3.module.dll acprotect -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.module.exe upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.module.exe upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.module.exe upx -
Loads dropped DLL 2 IoCs
Processes:
mciseq.exepid process 1232 mciseq.exe 1232 mciseq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ipapi.co 4 ipapi.co -
Drops file in System32 directory 1 IoCs
Processes:
mciseq.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ mciseq.exe -
NTFS ADS 2 IoCs
Processes:
mciseq.exec7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\winmgmts:\localhost\ mciseq.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
mciseq.exepid process 1232 mciseq.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exepid process 324 c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exetaskeng.exedescription pid process target process PID 324 wrote to memory of 1004 324 c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe mciseq.exe PID 324 wrote to memory of 1004 324 c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe mciseq.exe PID 324 wrote to memory of 1004 324 c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe mciseq.exe PID 324 wrote to memory of 1004 324 c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe mciseq.exe PID 1496 wrote to memory of 1232 1496 taskeng.exe mciseq.exe PID 1496 wrote to memory of 1232 1496 taskeng.exe mciseq.exe PID 1496 wrote to memory of 1232 1496 taskeng.exe mciseq.exe PID 1496 wrote to memory of 1232 1496 taskeng.exe mciseq.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe"C:\Users\Admin\AppData\Local\Temp\c7e5191b16640294ab397ba2287168307c8e727480ba9586565c9114536785fb.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.exe2⤵
- NTFS ADS
PID:1004
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {836912E7-120C-4017-89FD-86F98A84F0CA} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1232 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\ENU_687FE9737473A97E9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\1\*"3⤵PID:960
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources"3⤵
- Views/modifies file attributes
PID:548
-
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.exe2⤵PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD511de323911568453ef3a77bcecbaf59a
SHA1c9d11c292678e0582038577434530cb8f282a462
SHA256a125f8c890adc530bf51ee9aaa925eccbac6b8f4c562b1c4661835ece855af98
SHA512155aa3de732ac0456136dbaaa2dd79e463c75e7dc9894212c69f0c80f04e34825c5d803fe3d12af9abb8cf77ba5cf05b6545a9449b2ecf59d4cd097e52d6b358
-
Filesize
46KB
MD5ac56417b8d12be0f31458a3df92cf1d6
SHA18799efaba7cfb12a3002a471bbfebe81ba68ee17
SHA256d789d806b69686f9dbf6122fc77176c24b0ecb5230b4eec6109dfcbb86157d7d
SHA51282706288866806ab3bfb5342d7cb4fa6e6f96328b46c0e2a74cb0370f2a97dc530565241ee1b46d3dc8ad8c242d1d96d46e686b82b2ae12223e6b7c08f8fb096
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\wow64_microsoft-windows-wow64-legacy.resources\mciseq.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02