Analysis
-
max time kernel
134s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 02:07
Static task
static1
Behavioral task
behavioral1
Sample
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe
Resource
win7-20220414-en
General
-
Target
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe
-
Size
3.7MB
-
MD5
9a9be1e3cac62752ef96f8842024f7d5
-
SHA1
bf895506afe891fdf8e16d80e0f97bc5cb49ee76
-
SHA256
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678
-
SHA512
3080deb049e3577d2d6c87e00467222ac55635ccc1e14827969ccc7a1a462098effd8ce829aafa985f75ab20074a01ecc66815910b3becac68bb45ea8615d814
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
sbeio.module.exepid process 1928 sbeio.module.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exe upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exe upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exe upx behavioral1/memory/1928-77-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/596-55-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/596-58-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/596-59-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/596-60-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/596-63-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1988-64-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1988-67-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1988-81-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1032-85-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1032-88-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1676-91-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1676-94-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect behavioral1/memory/1676-95-0x0000000001300000-0x0000000001ADA000-memory.dmp vmprotect -
Loads dropped DLL 4 IoCs
Processes:
sbeio.exepid process 1988 sbeio.exe 1988 sbeio.exe 1988 sbeio.exe 1988 sbeio.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ipapi.co 7 ipapi.co -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/596-55-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/596-58-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/596-59-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/596-60-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/596-63-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1988-64-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1988-67-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1988-81-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1032-85-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1032-88-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1676-91-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1676-94-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/1676-95-0x0000000001300000-0x0000000001ADA000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
sbeio.exesbeio.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ sbeio.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ sbeio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
sbeio.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 sbeio.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 sbeio.exe -
NTFS ADS 2 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exesbeio.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\winmgmts:\localhost\ sbeio.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exesbeio.exesbeio.exesbeio.exepid process 596 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe 596 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe 1988 sbeio.exe 1988 sbeio.exe 1988 sbeio.exe 1032 sbeio.exe 1032 sbeio.exe 1676 sbeio.exe 1676 sbeio.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exepid process 596 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
sbeio.module.exedescription pid process Token: SeRestorePrivilege 1928 sbeio.module.exe Token: 35 1928 sbeio.module.exe Token: SeSecurityPrivilege 1928 sbeio.module.exe Token: SeSecurityPrivilege 1928 sbeio.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exesbeio.exetaskeng.exedescription pid process target process PID 596 wrote to memory of 1988 596 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe sbeio.exe PID 596 wrote to memory of 1988 596 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe sbeio.exe PID 596 wrote to memory of 1988 596 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe sbeio.exe PID 596 wrote to memory of 1988 596 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe sbeio.exe PID 1988 wrote to memory of 1928 1988 sbeio.exe sbeio.module.exe PID 1988 wrote to memory of 1928 1988 sbeio.exe sbeio.module.exe PID 1988 wrote to memory of 1928 1988 sbeio.exe sbeio.module.exe PID 1988 wrote to memory of 1928 1988 sbeio.exe sbeio.module.exe PID 1988 wrote to memory of 1512 1988 sbeio.exe attrib.exe PID 1988 wrote to memory of 1512 1988 sbeio.exe attrib.exe PID 1988 wrote to memory of 1512 1988 sbeio.exe attrib.exe PID 1988 wrote to memory of 1512 1988 sbeio.exe attrib.exe PID 1184 wrote to memory of 1032 1184 taskeng.exe sbeio.exe PID 1184 wrote to memory of 1032 1184 taskeng.exe sbeio.exe PID 1184 wrote to memory of 1032 1184 taskeng.exe sbeio.exe PID 1184 wrote to memory of 1032 1184 taskeng.exe sbeio.exe PID 1184 wrote to memory of 1676 1184 taskeng.exe sbeio.exe PID 1184 wrote to memory of 1676 1184 taskeng.exe sbeio.exe PID 1184 wrote to memory of 1676 1184 taskeng.exe sbeio.exe PID 1184 wrote to memory of 1676 1184 taskeng.exe sbeio.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe"C:\Users\Admin\AppData\Local\Temp\0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exe2⤵
- Loads dropped DLL
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\ENU_687FE9762211651E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db"3⤵
- Views/modifies file attributes
PID:1512
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {23374AF0-90DF-4665-9C80-3F08D731F994} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exe2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exe2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d2f7e21196d4b0e32e53056f478b3a22
SHA117a1a698b3284ad9afd4804de6f9e700d838a212
SHA256d8be1a59fe998344321b10d532e9af4f6c43449d34ecdba3847dd9d53100bc5d
SHA5125e3269b2a6d2000267ab494b05a841a507eff5f51c4e922cbd13929c410af6977b08f84cd51ea2901a96b16e4e987f5325d2862302a9d87b3202717250275ab8
-
Filesize
44KB
MD5c822f9c17f93d2b58c88103e2262ff86
SHA1fc414e95f2c6d7346c6b4e25a46164fb1ffdd1c6
SHA256cbd3f5ebdd2e2dadb3ede988deaf42831e7c755bd14d7d705f643e9d576a625f
SHA512dca564ca10e44d0693d42a2dbbbdaa51eeb426bcc2b07ba49e35d215dccb2e49dffe862b27b2c8c6b995de077d857562c2bc27ab0dc5eef3229beb085f8834e5
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02