Analysis
-
max time kernel
188s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe
Resource
win7-20220414-en
General
-
Target
1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe
-
Size
2.4MB
-
MD5
654315297a795b3cd81a37c4f71ceba5
-
SHA1
a77e4d0359943ec66376e82019129b0d3c2b7724
-
SHA256
1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0
-
SHA512
993da8afede0b8e22dd816000471758a63b8b2aafed53772ae29d539815e42d07a91d392907b5e384297f655acaa167f58ccdb49a499b0673314471ff99fb817
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000002320b-149.dat acprotect behavioral2/files/0x000700000002320b-150.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1984 NAPHLPR.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3304 attrib.exe -
resource yara_rule behavioral2/files/0x000700000002320b-149.dat upx behavioral2/files/0x000700000002320b-150.dat upx behavioral2/files/0x000400000000072b-174.dat upx behavioral2/files/0x000400000000072b-175.dat upx behavioral2/memory/1984-178-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4688 NAPHLPR.exe 4688 NAPHLPR.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ipapi.co 32 ipapi.co 48 ipapi.co -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1128-131-0x0000000000C90000-0x0000000000E65000-memory.dmp autoit_exe behavioral2/memory/1128-138-0x0000000000C90000-0x0000000000E65000-memory.dmp autoit_exe behavioral2/memory/4688-141-0x0000000000400000-0x00000000005D5000-memory.dmp autoit_exe behavioral2/memory/4688-148-0x0000000000400000-0x00000000005D5000-memory.dmp autoit_exe behavioral2/memory/792-163-0x0000000000400000-0x00000000005D5000-memory.dmp autoit_exe behavioral2/memory/316-172-0x0000000000400000-0x00000000005D5000-memory.dmp autoit_exe behavioral2/memory/4132-181-0x0000000000D20000-0x0000000000EF5000-memory.dmp autoit_exe behavioral2/memory/4132-188-0x0000000000D20000-0x0000000000EF5000-memory.dmp autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NAPHLPR.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NAPHLPR.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NAPHLPR.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2716 set thread context of 1128 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 83 PID 4756 set thread context of 4688 4756 NAPHLPR.exe 85 PID 2784 set thread context of 792 2784 NAPHLPR.exe 87 PID 2940 set thread context of 316 2940 NAPHLPR.exe 89 PID 5092 set thread context of 4132 5092 NAPHLPR.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4816 4688 WerFault.exe 85 -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\winmgmts:\localhost\ NAPHLPR.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4688 NAPHLPR.exe 4688 NAPHLPR.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1128 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1984 NAPHLPR.module.exe Token: 35 1984 NAPHLPR.module.exe Token: SeSecurityPrivilege 1984 NAPHLPR.module.exe Token: SeSecurityPrivilege 1984 NAPHLPR.module.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 4756 NAPHLPR.exe 4756 NAPHLPR.exe 4756 NAPHLPR.exe 2784 NAPHLPR.exe 2784 NAPHLPR.exe 2784 NAPHLPR.exe 2940 NAPHLPR.exe 2940 NAPHLPR.exe 2940 NAPHLPR.exe 5092 NAPHLPR.exe 5092 NAPHLPR.exe 5092 NAPHLPR.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 4756 NAPHLPR.exe 4756 NAPHLPR.exe 4756 NAPHLPR.exe 2784 NAPHLPR.exe 2784 NAPHLPR.exe 2784 NAPHLPR.exe 2940 NAPHLPR.exe 2940 NAPHLPR.exe 2940 NAPHLPR.exe 5092 NAPHLPR.exe 5092 NAPHLPR.exe 5092 NAPHLPR.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1128 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 83 PID 2716 wrote to memory of 1128 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 83 PID 2716 wrote to memory of 1128 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 83 PID 2716 wrote to memory of 1128 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 83 PID 2716 wrote to memory of 1128 2716 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 83 PID 1128 wrote to memory of 4756 1128 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 84 PID 1128 wrote to memory of 4756 1128 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 84 PID 1128 wrote to memory of 4756 1128 1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe 84 PID 4756 wrote to memory of 4688 4756 NAPHLPR.exe 85 PID 4756 wrote to memory of 4688 4756 NAPHLPR.exe 85 PID 4756 wrote to memory of 4688 4756 NAPHLPR.exe 85 PID 4756 wrote to memory of 4688 4756 NAPHLPR.exe 85 PID 4756 wrote to memory of 4688 4756 NAPHLPR.exe 85 PID 2784 wrote to memory of 792 2784 NAPHLPR.exe 87 PID 2784 wrote to memory of 792 2784 NAPHLPR.exe 87 PID 2784 wrote to memory of 792 2784 NAPHLPR.exe 87 PID 2784 wrote to memory of 792 2784 NAPHLPR.exe 87 PID 2784 wrote to memory of 792 2784 NAPHLPR.exe 87 PID 2940 wrote to memory of 316 2940 NAPHLPR.exe 89 PID 2940 wrote to memory of 316 2940 NAPHLPR.exe 89 PID 2940 wrote to memory of 316 2940 NAPHLPR.exe 89 PID 2940 wrote to memory of 316 2940 NAPHLPR.exe 89 PID 2940 wrote to memory of 316 2940 NAPHLPR.exe 89 PID 4688 wrote to memory of 1984 4688 NAPHLPR.exe 90 PID 4688 wrote to memory of 1984 4688 NAPHLPR.exe 90 PID 4688 wrote to memory of 1984 4688 NAPHLPR.exe 90 PID 4688 wrote to memory of 3304 4688 NAPHLPR.exe 92 PID 4688 wrote to memory of 3304 4688 NAPHLPR.exe 92 PID 4688 wrote to memory of 3304 4688 NAPHLPR.exe 92 PID 5092 wrote to memory of 4132 5092 NAPHLPR.exe 106 PID 5092 wrote to memory of 4132 5092 NAPHLPR.exe 106 PID 5092 wrote to memory of 4132 5092 NAPHLPR.exe 106 PID 5092 wrote to memory of 4132 5092 NAPHLPR.exe 106 PID 5092 wrote to memory of 4132 5092 NAPHLPR.exe 106 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3304 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe"C:\Users\Admin\AppData\Local\Temp\1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe"C:\Users\Admin\AppData\Local\Temp\1b14728bb3a182bcf26d6958a9283e3aa8c52d818e34aa8fd18a837d822252c0.exe"2⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"4⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\ENU_801FE97C5F89A74E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 25325⤵
- Program crash
PID:4816
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"2⤵
- Drops file in System32 directory
PID:792
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"2⤵
- Drops file in System32 directory
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4688 -ip 46881⤵PID:2648
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"2⤵
- Drops file in System32 directory
PID:4132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize1KB
MD50085fc6ff6ec7649b40d39fbb27621ae
SHA13bc13b2c0831d921be07f807667f9e782a81f3dd
SHA25664ac1618737da4e4c53c3fd94b8fe08515981b1bdd74fce47aa4628e11ceb135
SHA5129ebd2dcbd275575bbcbfaa94b3e6c48f0c2e12e6a9a56dad5b33521a11e28e0ec9704ba9fe7a4a4d492f8cea2929f25dbd3ba91e8a519b2de8fc1db45d967862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7EEA265692AC7955311B9E4CB27AFC35_3F411C6719032639C08C134E44D08A86
Filesize1KB
MD59dc8cffd5a3520fb6f173ada36ebc98e
SHA104a5fc563bcebff77d36eb519c956558134e09ba
SHA256c88ebf5821ef91fe371283edd0a3786b6a453ffafc44ebe6021bb917e53fa4a5
SHA5128398d501d1d02a3b27e75ee008d2e5bdf450922a8186fa144f55b4aef2b5508322dfab4acc487917121ba78de6b286eecb5c1d79406855d3a07c2d9075db88a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD5ac768ff2ba86be0a146ca2cf728b7b84
SHA15d3e59375e7ea3065a4f78503176fab5bda39426
SHA256e019255dc4588dce850c3e9efa548ed09a6a1ac4b61f8f54556f39aea58eacb1
SHA512f1adadc74ae37fd1180739765610f3851bd99d5f8e30bdbb35fddf79af8e5e12b7a473282dcac4ab280306340d7a07a0f4afc2213d228ac891f0ecb291de710f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD54113282a41366ff29510b7d84a7a83a7
SHA158696dea67308970f9363a7d9edb5ce8077766a4
SHA25601e2613eb89c2d8d79d7177626c9f684ba9bbd515b8d238f6a13fd25634bd50a
SHA5127ead24710f21cf8048985331de69993060406885a407543a6713f204dc85fe773f0aa3c9afd8b7d46bff677aac0ca55244ee2d2e4c64d157ab3a48aa7ede28d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7EEA265692AC7955311B9E4CB27AFC35_3F411C6719032639C08C134E44D08A86
Filesize482B
MD558b9c2e080ac5c5ada010059279df4a4
SHA1024f8dcb4540a20bfd8263d1c2431bf95b3a3fca
SHA2567229d806f0523162a3c07fbf75fe7960722a3b9f9e12460b3e289f1a7a2e33d3
SHA512c5651cdd3450898bd19f3c475e01e8f5f923683082d4ce536d9d5482fe566925dece7c1a551aedf3ff3a515a59496708f91e5e2d4e2130e203dc924a785834a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD5de3584a5e2f79c581a87a5322aa2e38b
SHA1c4101744e8eed414fa78ac5703fd6c582417ddc9
SHA256ea0a373d00ad4bede01485477be053b55f36877ff3bb07a0472722c51f4c246a
SHA512ab4034d1cb759934853c1cb27315b734513db6698b7583bd6fb98207e913c9c995fafbbfa02b68e30238fab34993fb6e9942b05004ffd9dbdd6bef0f66b163c5
-
Filesize
3KB
MD5fb297eac5433371bb4e80ac0042db812
SHA1579e6b38ff37e3621a5ccb6861598fb90e3d3c58
SHA256981ea4586730243d098f03355b7a3c19ea02e69c175f61e616a44872bd474e26
SHA512c4d9910d32c46e5c884bb67891091508426106f005fd47067d7244ee4a3e2e8c3d1d435d8e6e9c47f6ad8f0c975778c6127f3851746a28a98039a12adb48fe58
-
Filesize
49KB
MD54fa0c96e37cb6bee30107cc76295fae4
SHA1023fdf3b30b7ea5708691ceb0600b8fd06d37b34
SHA25658ea6f76277604df452bffcbf0fde0ad442bc2a386d7b3948dd8f561c5144540
SHA51224018dd02f5f6639a221ff7033287663767323b7a084447fc91c17b158a89b6978776ef752f575f6f71e398aa1b95ce7772950a7aea5dba80f6520022573fb7c
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02