Analysis
-
max time kernel
123s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 19:54
Static task
static1
Behavioral task
behavioral1
Sample
1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe
Resource
win7-20220414-en
General
-
Target
1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe
-
Size
1.6MB
-
MD5
be947dbfee390f2fe39a82e4f3f8615e
-
SHA1
c303c52cf8de2e903c20a922050055f1a78f63c9
-
SHA256
1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2
-
SHA512
f0ead47a4c11dd17c6d8f6e26e670bdc81c90bc3de5c07436c5f5cecce6db70a3437d18b7510ed89762999e4275553b3a0c7a7964bcc2a13bf2aa8ba75d9c53d
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_dual\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000013475-71.dat acprotect behavioral1/files/0x0008000000013475-72.dat acprotect -
Executes dropped EXE 7 IoCs
pid Process 948 XXMBK.exe 852 SSJK.exe 848 RTWorkQ.exe 360 RTWorkQ.module.exe 516 CDGH.exe 1456 RTWorkQ.exe 1068 RTWorkQ.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1356 attrib.exe -
resource yara_rule behavioral1/files/0x0008000000013475-71.dat upx behavioral1/files/0x0008000000013475-72.dat upx behavioral1/files/0x0009000000013a18-75.dat upx behavioral1/files/0x0009000000013a18-76.dat upx behavioral1/files/0x0009000000013a18-78.dat upx behavioral1/memory/360-81-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 10 IoCs
pid Process 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 948 XXMBK.exe 948 XXMBK.exe 948 XXMBK.exe 948 XXMBK.exe 848 RTWorkQ.exe 848 RTWorkQ.exe 848 RTWorkQ.exe 848 RTWorkQ.exe 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipapi.co 5 ipapi.co -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000001334e-60.dat autoit_exe behavioral1/files/0x000900000001334e-63.dat autoit_exe behavioral1/files/0x000900000001334e-62.dat autoit_exe behavioral1/files/0x000900000001334e-61.dat autoit_exe behavioral1/files/0x000900000001334e-65.dat autoit_exe behavioral1/files/0x000900000001334e-67.dat autoit_exe behavioral1/files/0x000900000001334e-69.dat autoit_exe behavioral1/files/0x000900000001334e-91.dat autoit_exe behavioral1/files/0x000900000001334e-94.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ RTWorkQ.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ RTWorkQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x000d00000000549e-84.dat nsis_installer_1 behavioral1/files/0x000d00000000549e-84.dat nsis_installer_2 behavioral1/files/0x000d00000000549e-86.dat nsis_installer_1 behavioral1/files/0x000d00000000549e-86.dat nsis_installer_2 behavioral1/files/0x000d00000000549e-88.dat nsis_installer_1 behavioral1/files/0x000d00000000549e-88.dat nsis_installer_2 -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\amd64_dual\winmgmts:\localhost\ RTWorkQ.exe File opened for modification C:\Users\Admin\AppData\Roaming\winmgmts:\localhost\ SSJK.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 848 RTWorkQ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 360 RTWorkQ.module.exe Token: 35 360 RTWorkQ.module.exe Token: SeSecurityPrivilege 360 RTWorkQ.module.exe Token: SeSecurityPrivilege 360 RTWorkQ.module.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 960 wrote to memory of 948 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 27 PID 960 wrote to memory of 948 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 27 PID 960 wrote to memory of 948 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 27 PID 960 wrote to memory of 948 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 27 PID 948 wrote to memory of 852 948 XXMBK.exe 28 PID 948 wrote to memory of 852 948 XXMBK.exe 28 PID 948 wrote to memory of 852 948 XXMBK.exe 28 PID 948 wrote to memory of 852 948 XXMBK.exe 28 PID 852 wrote to memory of 848 852 SSJK.exe 29 PID 852 wrote to memory of 848 852 SSJK.exe 29 PID 852 wrote to memory of 848 852 SSJK.exe 29 PID 852 wrote to memory of 848 852 SSJK.exe 29 PID 848 wrote to memory of 360 848 RTWorkQ.exe 33 PID 848 wrote to memory of 360 848 RTWorkQ.exe 33 PID 848 wrote to memory of 360 848 RTWorkQ.exe 33 PID 848 wrote to memory of 360 848 RTWorkQ.exe 33 PID 960 wrote to memory of 516 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 35 PID 960 wrote to memory of 516 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 35 PID 960 wrote to memory of 516 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 35 PID 960 wrote to memory of 516 960 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe 35 PID 848 wrote to memory of 1356 848 RTWorkQ.exe 36 PID 848 wrote to memory of 1356 848 RTWorkQ.exe 36 PID 848 wrote to memory of 1356 848 RTWorkQ.exe 36 PID 848 wrote to memory of 1356 848 RTWorkQ.exe 36 PID 768 wrote to memory of 1456 768 taskeng.exe 39 PID 768 wrote to memory of 1456 768 taskeng.exe 39 PID 768 wrote to memory of 1456 768 taskeng.exe 39 PID 768 wrote to memory of 1456 768 taskeng.exe 39 PID 768 wrote to memory of 1068 768 taskeng.exe 40 PID 768 wrote to memory of 1068 768 taskeng.exe 40 PID 768 wrote to memory of 1068 768 taskeng.exe 40 PID 768 wrote to memory of 1068 768 taskeng.exe 40 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1356 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe"C:\Users\Admin\AppData\Local\Temp\1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\XXMBK.exe"C:\Users\Admin\AppData\Local\Temp\XXMBK.exe" -s -pfsdgsdfvsdzcxfsDC2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\SSJK.exe"C:\Users\Admin\AppData\Roaming\SSJK.exe"3⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_dual\ENU_687FE975325E824E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_dual\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:360
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_dual"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CDGH.exe"C:\Users\Admin\AppData\Local\Temp\CDGH.exe"2⤵
- Executes dropped EXE
PID:516
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {003765F7-1D30-4069-A4AE-34ACE0F7791F} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1456
-
-
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5439e839b6ea367af00f7b99c0e9636a4
SHA172546bc18281613ce3f0a9138136ae33fe4559e8
SHA256cfdf8ea497068d151b91d122e0daa28e08a919d39cd0a061f0a66353d4fe3637
SHA512eaf8471418db8abb3488e3d11a097ee50c0f5cd44800d29a692fa70a6ec56865ac83ddb98373844801bc8978fa3a42373e22308a7a879c167d9c0a4596aa431b
-
Filesize
35KB
MD5439e839b6ea367af00f7b99c0e9636a4
SHA172546bc18281613ce3f0a9138136ae33fe4559e8
SHA256cfdf8ea497068d151b91d122e0daa28e08a919d39cd0a061f0a66353d4fe3637
SHA512eaf8471418db8abb3488e3d11a097ee50c0f5cd44800d29a692fa70a6ec56865ac83ddb98373844801bc8978fa3a42373e22308a7a879c167d9c0a4596aa431b
-
Filesize
1.6MB
MD5eceea2d65991ed05f6954752e9d036e9
SHA189be5d1bba918a61412b626b9c19fb07150b59d6
SHA25675eb9f06b32f7a10dbd995e7a7422f9ba15ca292c4af18b43b64dcaa14cea407
SHA512d3e5ac4b5bc39ae0bf1e5122b951f8bbaa58fbdc524a88a475e99dc54e1471a2f3629b4a9af7dd4ad25f092a514d1166c6ecb788fc97c3adde5a079ff1838a3e
-
Filesize
1.6MB
MD5eceea2d65991ed05f6954752e9d036e9
SHA189be5d1bba918a61412b626b9c19fb07150b59d6
SHA25675eb9f06b32f7a10dbd995e7a7422f9ba15ca292c4af18b43b64dcaa14cea407
SHA512d3e5ac4b5bc39ae0bf1e5122b951f8bbaa58fbdc524a88a475e99dc54e1471a2f3629b4a9af7dd4ad25f092a514d1166c6ecb788fc97c3adde5a079ff1838a3e
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
3KB
MD5e5c06ba7ce7ac34aa2220296b4e49479
SHA1f1a20e71f9cb2351bf2c18fc57586628c06408d1
SHA25679593d9ba2eee114b4a30797a180ef6458af1b50d49e18c2234c51811188e13c
SHA51274c4d7039039ac49037b7265f6e0b57e7101dde7fe6a5887ffc763aa8749a578c3e23cba57c33e8cb034a6c24d25b28cb7f797f27b2b95c69fa355e1d8572449
-
Filesize
50KB
MD5883d6ad9cfb48704b09d0316804bcfa1
SHA1508fef7b42fd906e1053dc8fcb26b27eb0e47cd6
SHA256a716226f6889770f0d6bfa7de5f7f04fe2fc640bf8c5b70ca16dac91891bacab
SHA512f6dd526633b0dbc1fe03e588ba5faf28c10158760ddd44d0bb79fe5dd1d58160ddb5f356ca8a747ec690a191cd3f94189f60c1e75e9a169c760cf21971d9aa5a
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
35KB
MD5439e839b6ea367af00f7b99c0e9636a4
SHA172546bc18281613ce3f0a9138136ae33fe4559e8
SHA256cfdf8ea497068d151b91d122e0daa28e08a919d39cd0a061f0a66353d4fe3637
SHA512eaf8471418db8abb3488e3d11a097ee50c0f5cd44800d29a692fa70a6ec56865ac83ddb98373844801bc8978fa3a42373e22308a7a879c167d9c0a4596aa431b
-
Filesize
1.6MB
MD5eceea2d65991ed05f6954752e9d036e9
SHA189be5d1bba918a61412b626b9c19fb07150b59d6
SHA25675eb9f06b32f7a10dbd995e7a7422f9ba15ca292c4af18b43b64dcaa14cea407
SHA512d3e5ac4b5bc39ae0bf1e5122b951f8bbaa58fbdc524a88a475e99dc54e1471a2f3629b4a9af7dd4ad25f092a514d1166c6ecb788fc97c3adde5a079ff1838a3e
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02