Analysis
-
max time kernel
126s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe
Resource
win7-20220414-en
General
-
Target
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe
-
Size
1.5MB
-
MD5
9718430597e4c4129c5a76346a5e0da7
-
SHA1
1dcb1d6af722ac2dfe64b02e5c95ea756af53732
-
SHA256
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718
-
SHA512
84c1cd9761c11af95b31d5cf1f52ccf5eeb837ae585fb63d2f2be3f69a8bb7aece4f1d37c00325bd8bf66e3881cf8f72e2fc42f047f66a6641ff86e0f87ae3b5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
NlsData081a.module.exepid process 1476 NlsData081a.module.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.module.exe upx -
Loads dropped DLL 2 IoCs
Processes:
NlsData081a.exepid process 4152 NlsData081a.exe 4152 NlsData081a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ipapi.co 8 ipapi.co 24 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
NlsData081a.exeNlsData081a.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NlsData081a.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NlsData081a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exeNlsData081a.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\winmgmts:\localhost\ NlsData081a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
NlsData081a.exepid process 4152 NlsData081a.exe 4152 NlsData081a.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exepid process 2620 79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
NlsData081a.module.exedescription pid process Token: SeRestorePrivilege 1476 NlsData081a.module.exe Token: 35 1476 NlsData081a.module.exe Token: SeSecurityPrivilege 1476 NlsData081a.module.exe Token: SeSecurityPrivilege 1476 NlsData081a.module.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exeNlsData081a.exedescription pid process target process PID 2620 wrote to memory of 4152 2620 79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe NlsData081a.exe PID 2620 wrote to memory of 4152 2620 79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe NlsData081a.exe PID 2620 wrote to memory of 4152 2620 79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe NlsData081a.exe PID 4152 wrote to memory of 1476 4152 NlsData081a.exe NlsData081a.module.exe PID 4152 wrote to memory of 1476 4152 NlsData081a.exe NlsData081a.module.exe PID 4152 wrote to memory of 1476 4152 NlsData081a.exe NlsData081a.module.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe"C:\Users\Admin\AppData\Local\Temp\79da42bac6738149bfe9decb17aa555806536fbc9ddefd2a700aa559f44b1718.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\ENU_801FE97C5F89A74E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.exe1⤵
- Drops file in System32 directory
PID:4116
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.exe1⤵
- Drops file in System32 directory
PID:5092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD519b0b33906652950667eea8f1f32c43a
SHA1bd61571683aaad94b580874450034dc382e80840
SHA256c2ea3fb30ce8c97691678699bd969089b425349f68c67bc369d743ea39283adb
SHA5126229081847b8641e11c961b76ef8b6663b13b0e8bb603bce98eafed2889bca139a1fbf0e5ab6cffc221ae97f081a1129eb8ab131a7244c0bee356fd71eec81b2
-
Filesize
52KB
MD5024bbf2ee92a5f0407a3436c48a8f10e
SHA1c51e6bf9beb6e180d6d1666f4cdd7ca5ef8e7945
SHA2568b830bb6b69d4d498609bcb90888bb0332c547c11a90e6e148a3e76b3d468952
SHA51252886c35e733727ce4bb893a3dc427b64980cfbe49c80c219e53d63971426c69a8506d6f4b934bc75a3207efa9c89ffa94e99aa163c0a1809119aa3282e6b612
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.module.exe
Filesize218KB
MD59c5b4e4fcae7eb410f09c9e46ffb4a6d
SHA19d233bbe69676b1064f1deafba8e70a9acc00773
SHA2560376139308f3e83a73b76d3938d9c100779a83b98eeb3b3ebacfcbd1cc027fe9
SHA51259c35d730dc17e790aa4c89f82fd2f64b4d67405c2bdf21d4a9757fa8bfb64461f1247c9da482b310b117f1a24144bf6c612c9f7587577b7a286e2e3de724ee5
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-ehome-devices-ehreplay\NlsData081a.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591