Analysis
-
max time kernel
100s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 02:07
Static task
static1
Behavioral task
behavioral1
Sample
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe
Resource
win7-20220414-en
General
-
Target
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe
-
Size
3.7MB
-
MD5
9a9be1e3cac62752ef96f8842024f7d5
-
SHA1
bf895506afe891fdf8e16d80e0f97bc5cb49ee76
-
SHA256
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678
-
SHA512
3080deb049e3577d2d6c87e00467222ac55635ccc1e14827969ccc7a1a462098effd8ce829aafa985f75ab20074a01ecc66815910b3becac68bb45ea8615d814
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
sbeio.module.exepid process 4460 sbeio.module.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exe upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exe upx behavioral2/memory/4460-154-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/1532-130-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/1532-134-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/1532-136-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/5052-137-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/5052-140-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/5052-141-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/5052-146-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/928-160-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/928-163-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect behavioral2/memory/928-164-0x0000000000990000-0x000000000116A000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
Processes:
sbeio.exepid process 5052 sbeio.exe 5052 sbeio.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ipapi.co 19 ipapi.co 34 ipapi.co -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1532-130-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/1532-134-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/1532-136-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/5052-137-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/5052-140-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/5052-141-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/5052-146-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/928-160-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/928-163-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe behavioral2/memory/928-164-0x0000000000990000-0x000000000116A000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
Processes:
sbeio.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ sbeio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exesbeio.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\winmgmts:\localhost\ sbeio.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exesbeio.exesbeio.exepid process 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe 5052 sbeio.exe 5052 sbeio.exe 5052 sbeio.exe 5052 sbeio.exe 5052 sbeio.exe 5052 sbeio.exe 928 sbeio.exe 928 sbeio.exe 928 sbeio.exe 928 sbeio.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exepid process 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
sbeio.module.exedescription pid process Token: SeRestorePrivilege 4460 sbeio.module.exe Token: 35 4460 sbeio.module.exe Token: SeSecurityPrivilege 4460 sbeio.module.exe Token: SeSecurityPrivilege 4460 sbeio.module.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exesbeio.exedescription pid process target process PID 1532 wrote to memory of 5052 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe sbeio.exe PID 1532 wrote to memory of 5052 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe sbeio.exe PID 1532 wrote to memory of 5052 1532 0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe sbeio.exe PID 5052 wrote to memory of 4460 5052 sbeio.exe sbeio.module.exe PID 5052 wrote to memory of 4460 5052 sbeio.exe sbeio.module.exe PID 5052 wrote to memory of 4460 5052 sbeio.exe sbeio.module.exe PID 5052 wrote to memory of 4468 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 4468 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 4468 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2288 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2288 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2288 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2904 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2904 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2904 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 3708 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 3708 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 3708 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2104 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2104 5052 sbeio.exe attrib.exe PID 5052 wrote to memory of 2104 5052 sbeio.exe attrib.exe -
Views/modifies file attributes 1 TTPs 5 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 4468 attrib.exe 2288 attrib.exe 2904 attrib.exe 3708 attrib.exe 2104 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe"C:\Users\Admin\AppData\Local\Temp\0bc34b2e2ff36841f5dac71b80d97d002e554bdc1c1f5b8e6776e907d8030678.exe"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\ENU_801FE97C5F89A74E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db"3⤵
- Views/modifies file attributes
PID:4468
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db"3⤵
- Views/modifies file attributes
PID:2288
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db"3⤵
- Views/modifies file attributes
PID:2904
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db"3⤵
- Views/modifies file attributes
PID:3708
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db"3⤵
- Views/modifies file attributes
PID:2104
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.exe1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5baeba814d4fd460ffd8c1bbb6f777b75
SHA1b1b5ecc71bf9bf55ee72be81a6aee1c9c9e86731
SHA2568ebbeda776c1c72df54aa2f9195341df2e6fc241bcfe6e89b09e945da0ab51a9
SHA512a49955107656e9dc9dd1168c1d440601bb9834c77d920cdbc3db62347c8ddacddba6a03f78566fb307163d0483578150cf80ad7d8d027776eecba1b14256a542
-
Filesize
49KB
MD50319291cd20fd6bd0c2ab9fa154bc852
SHA110228b06c27defb8779469e664ce27abd68ba4fe
SHA25602a28f1fc9ae78267b92c0c8c69c8b1aee536e82cd93557d6707abbb0d9a2351
SHA5120d8a2fd1e3e253ea29f02d049964ef915605104eb288a21a5cf31ad906242adb5852b37cc1a75ba706270d2012bac16a4ffc90038e82fa62d10f080ca78421c8
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-a..bility-assistant-db\sbeio.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02