Analysis
-
max time kernel
125s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 22:50
Static task
static1
Behavioral task
behavioral1
Sample
1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe
Resource
win7-20220414-en
General
-
Target
1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe
-
Size
1.6MB
-
MD5
355237317f0c1f050f370497829ef4de
-
SHA1
982f9a8357afba7a19e652314835c71c8db31122
-
SHA256
1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6
-
SHA512
c8db2d4f9fa04e7f3d17c79aeef3ce1a37ecb1ffe6991bf48af6d03db4b6442233cb3b77950d4dcc0088bd9b98792b94003601b524d40e534f0e9eb25f2e8286
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_dual\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral2/files/0x0007000000022ec5-138.dat acprotect behavioral2/files/0x0007000000022ec5-139.dat acprotect -
Executes dropped EXE 8 IoCs
Processes:
XXMBK.exeSSJK.exeRTWorkQ.exeRTWorkQ.module.exeCDGH.exeRTWorkQ.exeRTWorkQ.exeRTWorkQ.exepid Process 4668 XXMBK.exe 1256 SSJK.exe 1684 RTWorkQ.exe 2628 RTWorkQ.module.exe 1868 CDGH.exe 3076 RTWorkQ.exe 1792 RTWorkQ.exe 2408 RTWorkQ.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule behavioral2/files/0x0007000000022ec5-138.dat upx behavioral2/files/0x0007000000022ec5-139.dat upx behavioral2/files/0x0007000000022ecd-143.dat upx behavioral2/memory/2628-144-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/files/0x0007000000022ecd-145.dat upx behavioral2/memory/2628-148-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
XXMBK.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation XXMBK.exe -
Loads dropped DLL 2 IoCs
Processes:
RTWorkQ.exepid Process 1684 RTWorkQ.exe 1684 RTWorkQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ipapi.co 17 ipapi.co -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000022ebb-134.dat autoit_exe behavioral2/files/0x0007000000022ebb-135.dat autoit_exe behavioral2/files/0x0007000000022ebb-137.dat autoit_exe behavioral2/files/0x0007000000022ebb-155.dat autoit_exe behavioral2/files/0x0007000000022ebb-156.dat autoit_exe behavioral2/files/0x0007000000022ebb-157.dat autoit_exe -
Drops file in System32 directory 3 IoCs
Processes:
RTWorkQ.exeRTWorkQ.exeRTWorkQ.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ RTWorkQ.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ RTWorkQ.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ RTWorkQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule behavioral2/files/0x000a000000022ead-153.dat nsis_installer_1 behavioral2/files/0x000a000000022ead-153.dat nsis_installer_2 behavioral2/files/0x000a000000022ead-154.dat nsis_installer_1 behavioral2/files/0x000a000000022ead-154.dat nsis_installer_2 -
NTFS ADS 2 IoCs
Processes:
SSJK.exeRTWorkQ.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\winmgmts:\localhost\ SSJK.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_dual\winmgmts:\localhost\ RTWorkQ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RTWorkQ.exepid Process 1684 RTWorkQ.exe 1684 RTWorkQ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RTWorkQ.module.exedescription pid Process Token: SeRestorePrivilege 2628 RTWorkQ.module.exe Token: 35 2628 RTWorkQ.module.exe Token: SeSecurityPrivilege 2628 RTWorkQ.module.exe Token: SeSecurityPrivilege 2628 RTWorkQ.module.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exeXXMBK.exeSSJK.exeRTWorkQ.exedescription pid Process procid_target PID 2476 wrote to memory of 4668 2476 1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe 82 PID 2476 wrote to memory of 4668 2476 1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe 82 PID 2476 wrote to memory of 4668 2476 1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe 82 PID 4668 wrote to memory of 1256 4668 XXMBK.exe 83 PID 4668 wrote to memory of 1256 4668 XXMBK.exe 83 PID 4668 wrote to memory of 1256 4668 XXMBK.exe 83 PID 1256 wrote to memory of 1684 1256 SSJK.exe 85 PID 1256 wrote to memory of 1684 1256 SSJK.exe 85 PID 1256 wrote to memory of 1684 1256 SSJK.exe 85 PID 1684 wrote to memory of 2628 1684 RTWorkQ.exe 89 PID 1684 wrote to memory of 2628 1684 RTWorkQ.exe 89 PID 1684 wrote to memory of 2628 1684 RTWorkQ.exe 89 PID 1684 wrote to memory of 4252 1684 RTWorkQ.exe 92 PID 1684 wrote to memory of 4252 1684 RTWorkQ.exe 92 PID 1684 wrote to memory of 4252 1684 RTWorkQ.exe 92 PID 2476 wrote to memory of 1868 2476 1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe 96 PID 2476 wrote to memory of 1868 2476 1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe 96 PID 2476 wrote to memory of 1868 2476 1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe 96 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe"C:\Users\Admin\AppData\Local\Temp\1df742d27fe872427bc8e913ab19ae7d721a7d22d9707176aec8d61b3a2156e6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\XXMBK.exe"C:\Users\Admin\AppData\Local\Temp\XXMBK.exe" -s -pfsdgsdfvsdzcxfsDC2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\SSJK.exe"C:\Users\Admin\AppData\Roaming\SSJK.exe"3⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_dual\ENU_801FE970A758A6AE9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_dual\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_dual"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4252
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CDGH.exe"C:\Users\Admin\AppData\Local\Temp\CDGH.exe"2⤵
- Executes dropped EXE
PID:1868
-
-
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3076
-
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1792
-
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5439e839b6ea367af00f7b99c0e9636a4
SHA172546bc18281613ce3f0a9138136ae33fe4559e8
SHA256cfdf8ea497068d151b91d122e0daa28e08a919d39cd0a061f0a66353d4fe3637
SHA512eaf8471418db8abb3488e3d11a097ee50c0f5cd44800d29a692fa70a6ec56865ac83ddb98373844801bc8978fa3a42373e22308a7a879c167d9c0a4596aa431b
-
Filesize
35KB
MD5439e839b6ea367af00f7b99c0e9636a4
SHA172546bc18281613ce3f0a9138136ae33fe4559e8
SHA256cfdf8ea497068d151b91d122e0daa28e08a919d39cd0a061f0a66353d4fe3637
SHA512eaf8471418db8abb3488e3d11a097ee50c0f5cd44800d29a692fa70a6ec56865ac83ddb98373844801bc8978fa3a42373e22308a7a879c167d9c0a4596aa431b
-
Filesize
1.6MB
MD5a24d6f686b4e46d2a828036ed821f15a
SHA17df1294dd167c8c50b21d5ac5b731ccb140f39e1
SHA256a3253375704929d9843d71b2a974661ab9014ebb4a510be7576654be456de5ad
SHA512338697d0e29ec48bcc3e8cea7828628472773e2b72a820a81d306f774d81a7e060d70b5a97f4b29c9086c0fc1f0d4a2cc675318e54c4a0f6bdd152754c853936
-
Filesize
1.6MB
MD5a24d6f686b4e46d2a828036ed821f15a
SHA17df1294dd167c8c50b21d5ac5b731ccb140f39e1
SHA256a3253375704929d9843d71b2a974661ab9014ebb4a510be7576654be456de5ad
SHA512338697d0e29ec48bcc3e8cea7828628472773e2b72a820a81d306f774d81a7e060d70b5a97f4b29c9086c0fc1f0d4a2cc675318e54c4a0f6bdd152754c853936
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
4KB
MD5b6b123fb86a4560a4cdaa1a5fbb6c7ef
SHA1b290b57709d2f069d810fe545fe223659e3cc075
SHA256b9fbf41df701ad41d2d6a83128a2cea09adee50fa827343209e6777335cef873
SHA5125c4c3ed2dfb361b12733edd73925fd16ab34c702efe8a8060240326574534c65c9939e790d2f259f3956c07d59f057108f310792b63ded4b2ad04309953a1906
-
Filesize
53KB
MD528a486717c7c13fd5e9452be89838098
SHA185ee0b66be266575be1e063fc8d0edc6d76e9d50
SHA256ccb3cc9e2d2c4f2aab2a594820fec61cbc7a2324f7e4e74d10398630b09123d3
SHA512e9515c6ad61141c8d8da4c83a7dd895013328a0d734b1045f1a50f715530a4dddf682fb1dff1f7ad692e17c8c265c7be679e4f80e5d5df6e3eb8ee353b9a7cb6
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02