Analysis
-
max time kernel
124s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 18:05
Static task
static1
Behavioral task
behavioral1
Sample
1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe
Resource
win10v2004-20220414-en
General
-
Target
1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe
-
Size
1.8MB
-
MD5
73d9794c8e50c039182ae2707f7909f3
-
SHA1
556104b07b5cd018c9931b74a4f07956b84efee0
-
SHA256
1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46
-
SHA512
6153bec770d13ec6f810cdd6ef8b0742e8de4d7263b43bc5bd19b447b2de2c51969f926af40d668dff87cf4d9a00bf1f84a3879ccb48307d6ee2454fbada4ed5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a0000000122f0-57.dat acprotect behavioral1/files/0x000a0000000122f0-58.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2004 odbccp32.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1692 attrib.exe -
resource yara_rule behavioral1/files/0x000a0000000122f0-57.dat upx behavioral1/files/0x000a0000000122f0-58.dat upx behavioral1/files/0x000a0000000122fa-60.dat upx behavioral1/files/0x000a0000000122fa-61.dat upx behavioral1/files/0x000a0000000122fa-63.dat upx behavioral1/memory/2004-66-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1976 odbccp32.exe 1976 odbccp32.exe 1976 odbccp32.exe 1976 odbccp32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipapi.co 6 ipapi.co -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ odbccp32.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ odbccp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\winmgmts:\localhost\ odbccp32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1976 odbccp32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1064 1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2004 odbccp32.module.exe Token: 35 2004 odbccp32.module.exe Token: SeSecurityPrivilege 2004 odbccp32.module.exe Token: SeSecurityPrivilege 2004 odbccp32.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1976 1064 1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe 28 PID 1064 wrote to memory of 1976 1064 1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe 28 PID 1064 wrote to memory of 1976 1064 1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe 28 PID 1064 wrote to memory of 1976 1064 1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe 28 PID 1976 wrote to memory of 2004 1976 odbccp32.exe 32 PID 1976 wrote to memory of 2004 1976 odbccp32.exe 32 PID 1976 wrote to memory of 2004 1976 odbccp32.exe 32 PID 1976 wrote to memory of 2004 1976 odbccp32.exe 32 PID 1976 wrote to memory of 1692 1976 odbccp32.exe 34 PID 1976 wrote to memory of 1692 1976 odbccp32.exe 34 PID 1976 wrote to memory of 1692 1976 odbccp32.exe 34 PID 1976 wrote to memory of 1692 1976 odbccp32.exe 34 PID 324 wrote to memory of 804 324 taskeng.exe 37 PID 324 wrote to memory of 804 324 taskeng.exe 37 PID 324 wrote to memory of 804 324 taskeng.exe 37 PID 324 wrote to memory of 804 324 taskeng.exe 37 PID 324 wrote to memory of 700 324 taskeng.exe 38 PID 324 wrote to memory of 700 324 taskeng.exe 38 PID 324 wrote to memory of 700 324 taskeng.exe 38 PID 324 wrote to memory of 700 324 taskeng.exe 38 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1692 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe"C:\Users\Admin\AppData\Local\Temp\1839619cf00da397e395b9555b6d0c9e30ac389ef48dfbbd0ddba4a083a7eb46.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.exeC:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.module.exeC:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\ENU_687FE9737473A97E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1692
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7F9DDA98-503A-4C01-AF9A-CF2CC18F6324} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.exeC:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.exe2⤵
- Drops file in System32 directory
PID:804
-
-
C:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.exeC:\Users\Admin\AppData\Roaming\amd64_cpu.inf.resources\odbccp32.exe2⤵
- Drops file in System32 directory
PID:700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD502e129a8364d221c89609b3baacd049f
SHA10444a9640abbb7dad2866c70703d8daa43544912
SHA25695a6558d9a3489cf654cb3e8e994960330d04dd4d91cbbc6d5a290bb0b4dd425
SHA5126f1e43c3ea0d748306c6628b44a76b6fc1ccd179cd752b36e87a5a26aea4a79cccf04fec3e26a0ed5d26c887b7a0a44f8d62058007033454d3b2474a356361fb
-
Filesize
46KB
MD55640032d4119d4264f50fa69fb5201fa
SHA169bbf3d3b5d6d8313bdae9d21848ed3449d991ce
SHA2568ab97ad7639d8c4b4372df6a2f7bdbf49715e822c6f57f020a37a8a42d8d6c2b
SHA512f369cd2c7bd5b80bfd71acaa26386b0840daa8151192eab8de2d7b7a4ddc893d48930cf5088d95001a0a3145a3b2c6df4dc75d8ed2e12105ab9a4e04a4e0f39b
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02