Analysis
-
max time kernel
131s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 04:49
Static task
static1
Behavioral task
behavioral1
Sample
228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe
Resource
win7-20220414-en
General
-
Target
228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe
-
Size
2.3MB
-
MD5
b2786685ef7d2bd36100a8b68a6ace40
-
SHA1
91df42741d67f5aad789ae282804d8f3cfcac40c
-
SHA256
228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075
-
SHA512
389e0e8d696eec31e2e03b1dd2f5ddbf0f515481c9726aa8cae02632ba36820f6a6fcf856b7c03054f6477bd02af36b0395a33966a2016766f4daa3ab26a4b53
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
KBDSN1.module.exepid process 4064 KBDSN1.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.module.exe upx behavioral2/memory/4064-141-0x0000000000C30000-0x0000000000CBF000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
KBDSN1.exepid process 4396 KBDSN1.exe 4396 KBDSN1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ipapi.co 25 ipapi.co 13 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
KBDSN1.exeKBDSN1.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ KBDSN1.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ KBDSN1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
KBDSN1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 KBDSN1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 KBDSN1.exe -
NTFS ADS 2 IoCs
Processes:
228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exeKBDSN1.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\winmgmts:\localhost\ KBDSN1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
KBDSN1.exepid process 4396 KBDSN1.exe 4396 KBDSN1.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exepid process 3368 228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
KBDSN1.module.exedescription pid process Token: SeRestorePrivilege 4064 KBDSN1.module.exe Token: 35 4064 KBDSN1.module.exe Token: SeSecurityPrivilege 4064 KBDSN1.module.exe Token: SeSecurityPrivilege 4064 KBDSN1.module.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exeKBDSN1.exedescription pid process target process PID 3368 wrote to memory of 4396 3368 228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe KBDSN1.exe PID 3368 wrote to memory of 4396 3368 228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe KBDSN1.exe PID 3368 wrote to memory of 4396 3368 228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe KBDSN1.exe PID 4396 wrote to memory of 4064 4396 KBDSN1.exe KBDSN1.module.exe PID 4396 wrote to memory of 4064 4396 KBDSN1.exe KBDSN1.module.exe PID 4396 wrote to memory of 4064 4396 KBDSN1.exe KBDSN1.module.exe PID 4396 wrote to memory of 4788 4396 KBDSN1.exe attrib.exe PID 4396 wrote to memory of 4788 4396 KBDSN1.exe attrib.exe PID 4396 wrote to memory of 4788 4396 KBDSN1.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe"C:\Users\Admin\AppData\Local\Temp\228ed897d96e7f5c588a0e1b7a2f7a97e1145ac81cb5ef92af7a0c0d3fa78075.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.exe2⤵
- Loads dropped DLL
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\ENU_801FE97294A87C4E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4788
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.exe1⤵
- Drops file in System32 directory
PID:4224
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-mfplat.resources\KBDSN1.exe1⤵
- Drops file in System32 directory
PID:3432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53aa341af136cd04e25f90ab6361dae79
SHA1dff370748d9b85f1e9bcc37c63333fb865ae3ae1
SHA2567446ab1c6c5ba0d19c3c5097fa0e0c5d79bf76d4ecb0c4780faf39f4c7ad0bb6
SHA512902442649a5f805cf618759ffe6292f2105c15e5261c35afbc5b4b236d9c32a1bab97d6391949505ab85e47e0a5c909bbf1f122d2d891feeb6e091747f54feb0
-
Filesize
51KB
MD5c99974b8f0eb799a334282cecb8656fb
SHA193a207014e2177b275696adb8698139a3766ead1
SHA256d4d7896a9dd04f529da32d02995055f1620724b739d25a4912755acc30aa8e29
SHA51250eb67f7295fa6fcf23b01c6ca87451e82b785f4e73ee57f028e103ac1581575167d98557cb2df0534812afb546e3e63ab61342b910d895aa07d0891c89ced15
-
Filesize
221KB
MD5965119091c292c96af5011f40dae87a5
SHA185708f7bab07528f1b6e9dfbf64648189a513043
SHA2561ad53eed4d91c6835551aa997399b6054cdf53bca33f103aec24afe46547186b
SHA512244ef9a88308f9a1d738bb1fbf9f6125a4f25ef5665df85adff1985068f92a1d9714785eb63183fede6f1fd9c1420eecfa185a971c99ab835a8f9ea770d94629
-
Filesize
358KB
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c
-
Filesize
358KB
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c