Analysis
-
max time kernel
151s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 04:56
Static task
static1
Behavioral task
behavioral1
Sample
2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe
Resource
win7-20220414-en
General
-
Target
2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe
-
Size
1.5MB
-
MD5
bb93c65b8447626f0f49c13b3b876016
-
SHA1
b0a87001381a50d62396a0f39e055b072141e631
-
SHA256
2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6
-
SHA512
d482c6800fb77753c168db6528b61b727c4589e811347f13f3f2ae2c641168946da4f330f9d75606a575a886844513f7dcc30921bcfe6ac1575fbf9b3a122ac5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
SndVolSSO.module.exepid process 2228 SndVolSSO.module.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.module.exe upx behavioral2/memory/2228-139-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/2228-142-0x0000000000400000-0x000000000048E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
SndVolSSO.exepid process 2068 SndVolSSO.exe 2068 SndVolSSO.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ipapi.co 19 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
SndVolSSO.exeSndVolSSO.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ SndVolSSO.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ SndVolSSO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exeSndVolSSO.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\winmgmts:\localhost\ SndVolSSO.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 55 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SndVolSSO.exepid process 2068 SndVolSSO.exe 2068 SndVolSSO.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exepid process 3064 2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
SndVolSSO.module.exedescription pid process Token: SeRestorePrivilege 2228 SndVolSSO.module.exe Token: 35 2228 SndVolSSO.module.exe Token: SeSecurityPrivilege 2228 SndVolSSO.module.exe Token: SeSecurityPrivilege 2228 SndVolSSO.module.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exeSndVolSSO.exedescription pid process target process PID 3064 wrote to memory of 2068 3064 2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe SndVolSSO.exe PID 3064 wrote to memory of 2068 3064 2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe SndVolSSO.exe PID 3064 wrote to memory of 2068 3064 2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe SndVolSSO.exe PID 2068 wrote to memory of 2228 2068 SndVolSSO.exe SndVolSSO.module.exe PID 2068 wrote to memory of 2228 2068 SndVolSSO.exe SndVolSSO.module.exe PID 2068 wrote to memory of 2228 2068 SndVolSSO.exe SndVolSSO.module.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe"C:\Users\Admin\AppData\Local\Temp\2286c65c1d15837f5568a91ca8000d2be89001123a842533258d5df16ca366e6.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\ENU_801FE97294A87C4E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.exe1⤵
- Drops file in System32 directory
PID:4972
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.exe1⤵
- Drops file in System32 directory
PID:4172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cd7a85bd393ed477e0fca3c15af0e2b4
SHA116b6c38797c6dffb58d33a7bf55e212cc7e5603c
SHA256b9203240393263b03f01de46e2976e0d1df1350cf8907b6bc93e0e582a75f1eb
SHA512c9159db2975333a8cd6c0d4431c9bb40b03c54c0539d37c1daf8025e395ea65e9488b7c0a077d8e7d9ae71bddf349da7a80a0a241140e2ca687f5febeea5fa1c
-
Filesize
46KB
MD5bccbf126462288a152b86e062cbefe1d
SHA19d5225596957c534bb3fa6825b1f04bc50d84820
SHA256b7af541066ecc833b36ef75cb7d6a3796a075f674df3f8db0e0dab5fc945e2af
SHA51276c22283e239af81db86cac5d9cc4e0b0f861104918ec53377522e38a56042c187fdb6cbc970a083109f4b93d1fe35b68a55ddcd96419dad2e13a61be18dc341
-
Filesize
218KB
MD59c5b4e4fcae7eb410f09c9e46ffb4a6d
SHA19d233bbe69676b1064f1deafba8e70a9acc00773
SHA2560376139308f3e83a73b76d3938d9c100779a83b98eeb3b3ebacfcbd1cc027fe9
SHA51259c35d730dc17e790aa4c89f82fd2f64b4d67405c2bdf21d4a9757fa8bfb64461f1247c9da482b310b117f1a24144bf6c612c9f7587577b7a286e2e3de724ee5
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-i..er-engine.resources\SndVolSSO.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591