Analysis
-
max time kernel
130s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 05:36
Static task
static1
Behavioral task
behavioral1
Sample
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe
Resource
win7-20220414-en
General
-
Target
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe
-
Size
2.5MB
-
MD5
12bfb8030f170920a4cccca7fb38bf8c
-
SHA1
c0b3dd1d9f7c64d8f5c131344dad17534fe8ccf1
-
SHA256
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee
-
SHA512
8bb21fc02b9c9aafd47f69923240ed714eb0c634871ae801c4670eb23b6bba39b4b5a8266fb801174e5aa74f25ef497948e5330129783f3731743df689d8bbed
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
cryptdlg.module.exepid process 1200 cryptdlg.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.module.exe upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.module.exe upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.module.exe upx behavioral1/memory/1200-91-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
cryptdlg.exepid process 1980 cryptdlg.exe 1980 cryptdlg.exe 1980 cryptdlg.exe 1980 cryptdlg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipapi.co 6 ipapi.co -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1184-57-0x0000000000670000-0x0000000000845000-memory.dmp autoit_exe behavioral1/memory/1184-64-0x000000000069800A-mapping.dmp autoit_exe behavioral1/memory/1184-66-0x0000000000670000-0x0000000000845000-memory.dmp autoit_exe behavioral1/memory/1980-73-0x00000000005B0000-0x0000000000785000-memory.dmp autoit_exe behavioral1/memory/1980-78-0x00000000005D800A-mapping.dmp autoit_exe behavioral1/memory/1980-80-0x00000000005B0000-0x0000000000785000-memory.dmp autoit_exe behavioral1/memory/1980-83-0x0000000061E00000-0x0000000061ED2000-memory.dmp autoit_exe behavioral1/memory/1980-84-0x0000000061E00000-0x0000000061ED2000-memory.dmp autoit_exe behavioral1/memory/1424-102-0x00000000006D0000-0x00000000008A5000-memory.dmp autoit_exe behavioral1/memory/1424-109-0x00000000006F800A-mapping.dmp autoit_exe behavioral1/memory/1424-111-0x00000000006D0000-0x00000000008A5000-memory.dmp autoit_exe behavioral1/memory/1708-116-0x0000000000710000-0x00000000008E5000-memory.dmp autoit_exe behavioral1/memory/1708-123-0x000000000073800A-mapping.dmp autoit_exe behavioral1/memory/1708-125-0x0000000000710000-0x00000000008E5000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
cryptdlg.execryptdlg.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ cryptdlg.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ cryptdlg.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.execryptdlg.execryptdlg.execryptdlg.exedescription pid process target process PID 960 set thread context of 1184 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe PID 1900 set thread context of 1980 1900 cryptdlg.exe cryptdlg.exe PID 964 set thread context of 1424 964 cryptdlg.exe cryptdlg.exe PID 1984 set thread context of 1708 1984 cryptdlg.exe cryptdlg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
cryptdlg.exe19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\winmgmts:\localhost\ cryptdlg.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cryptdlg.exepid process 1980 cryptdlg.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exepid process 1184 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cryptdlg.module.exedescription pid process Token: SeRestorePrivilege 1200 cryptdlg.module.exe Token: 35 1200 cryptdlg.module.exe Token: SeSecurityPrivilege 1200 cryptdlg.module.exe Token: SeSecurityPrivilege 1200 cryptdlg.module.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.execryptdlg.execryptdlg.execryptdlg.exepid process 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 1900 cryptdlg.exe 1900 cryptdlg.exe 1900 cryptdlg.exe 964 cryptdlg.exe 964 cryptdlg.exe 964 cryptdlg.exe 1984 cryptdlg.exe 1984 cryptdlg.exe 1984 cryptdlg.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.execryptdlg.execryptdlg.execryptdlg.exepid process 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 1900 cryptdlg.exe 1900 cryptdlg.exe 1900 cryptdlg.exe 964 cryptdlg.exe 964 cryptdlg.exe 964 cryptdlg.exe 1984 cryptdlg.exe 1984 cryptdlg.exe 1984 cryptdlg.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.execryptdlg.execryptdlg.exetaskeng.execryptdlg.execryptdlg.exedescription pid process target process PID 960 wrote to memory of 1184 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe PID 960 wrote to memory of 1184 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe PID 960 wrote to memory of 1184 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe PID 960 wrote to memory of 1184 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe PID 960 wrote to memory of 1184 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe PID 960 wrote to memory of 1184 960 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe PID 1184 wrote to memory of 1900 1184 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe cryptdlg.exe PID 1184 wrote to memory of 1900 1184 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe cryptdlg.exe PID 1184 wrote to memory of 1900 1184 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe cryptdlg.exe PID 1184 wrote to memory of 1900 1184 19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe cryptdlg.exe PID 1900 wrote to memory of 1980 1900 cryptdlg.exe cryptdlg.exe PID 1900 wrote to memory of 1980 1900 cryptdlg.exe cryptdlg.exe PID 1900 wrote to memory of 1980 1900 cryptdlg.exe cryptdlg.exe PID 1900 wrote to memory of 1980 1900 cryptdlg.exe cryptdlg.exe PID 1900 wrote to memory of 1980 1900 cryptdlg.exe cryptdlg.exe PID 1900 wrote to memory of 1980 1900 cryptdlg.exe cryptdlg.exe PID 1980 wrote to memory of 1200 1980 cryptdlg.exe cryptdlg.module.exe PID 1980 wrote to memory of 1200 1980 cryptdlg.exe cryptdlg.module.exe PID 1980 wrote to memory of 1200 1980 cryptdlg.exe cryptdlg.module.exe PID 1980 wrote to memory of 1200 1980 cryptdlg.exe cryptdlg.module.exe PID 1980 wrote to memory of 852 1980 cryptdlg.exe attrib.exe PID 1980 wrote to memory of 852 1980 cryptdlg.exe attrib.exe PID 1980 wrote to memory of 852 1980 cryptdlg.exe attrib.exe PID 1980 wrote to memory of 852 1980 cryptdlg.exe attrib.exe PID 1148 wrote to memory of 964 1148 taskeng.exe cryptdlg.exe PID 1148 wrote to memory of 964 1148 taskeng.exe cryptdlg.exe PID 1148 wrote to memory of 964 1148 taskeng.exe cryptdlg.exe PID 1148 wrote to memory of 964 1148 taskeng.exe cryptdlg.exe PID 964 wrote to memory of 1424 964 cryptdlg.exe cryptdlg.exe PID 964 wrote to memory of 1424 964 cryptdlg.exe cryptdlg.exe PID 964 wrote to memory of 1424 964 cryptdlg.exe cryptdlg.exe PID 964 wrote to memory of 1424 964 cryptdlg.exe cryptdlg.exe PID 964 wrote to memory of 1424 964 cryptdlg.exe cryptdlg.exe PID 964 wrote to memory of 1424 964 cryptdlg.exe cryptdlg.exe PID 1148 wrote to memory of 1984 1148 taskeng.exe cryptdlg.exe PID 1148 wrote to memory of 1984 1148 taskeng.exe cryptdlg.exe PID 1148 wrote to memory of 1984 1148 taskeng.exe cryptdlg.exe PID 1148 wrote to memory of 1984 1148 taskeng.exe cryptdlg.exe PID 1984 wrote to memory of 1708 1984 cryptdlg.exe cryptdlg.exe PID 1984 wrote to memory of 1708 1984 cryptdlg.exe cryptdlg.exe PID 1984 wrote to memory of 1708 1984 cryptdlg.exe cryptdlg.exe PID 1984 wrote to memory of 1708 1984 cryptdlg.exe cryptdlg.exe PID 1984 wrote to memory of 1708 1984 cryptdlg.exe cryptdlg.exe PID 1984 wrote to memory of 1708 1984 cryptdlg.exe cryptdlg.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe"C:\Users\Admin\AppData\Local\Temp\19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe"C:\Users\Admin\AppData\Local\Temp\19bb7a034d6d884ee350df147940446783b5b71e4a52ea54cd98f33ec411d9ee.exe"2⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe"4⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\ENU_687FE978D73A864E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:852
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {305952F0-46A7-44DA-B9E3-7388D83B1678} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe"3⤵
- Drops file in System32 directory
PID:1424
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.exe"3⤵
- Drops file in System32 directory
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55becf908ce9ea4d2c7c647853735e008
SHA1b5e57e8f15dd8009540a222fc1cebc2e83e21f8f
SHA256640ee70760eae7388729735270c76bff183e43af65b82b5724b19d0487624b95
SHA512f1797df06b96f37e3629f5117cdcb127b4688a96520f5c644b00d8dd0b05c046ef7bef1b1068264094596a6c9f0a842cda24f2b03fc9e41acab6b05bda61d375
-
Filesize
50KB
MD50e636605595362b0107c202245dae1c1
SHA1197c23b52191e42659b64f5f357e1a34184b2c41
SHA256726dc1b7759e9bc40e549fb50321fe4ac4e514c47ceef05bbc6d04f264c5c3e5
SHA5121b2c073404728769a63f54e435362e0bb77d97dc3225ee750796d0ac6064c95d5e7a3777963df0353667a1504f974d667684e6ee73b47bbc38eac7fcfab10589
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-naturallanguage6-0022\cryptdlg.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02