Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 19:54
Static task
static1
Behavioral task
behavioral1
Sample
1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe
Resource
win7-20220414-en
General
-
Target
1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe
-
Size
1.6MB
-
MD5
be947dbfee390f2fe39a82e4f3f8615e
-
SHA1
c303c52cf8de2e903c20a922050055f1a78f63c9
-
SHA256
1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2
-
SHA512
f0ead47a4c11dd17c6d8f6e26e670bdc81c90bc3de5c07436c5f5cecce6db70a3437d18b7510ed89762999e4275553b3a0c7a7964bcc2a13bf2aa8ba75d9c53d
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_dual\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.sqlite3.module.dll acprotect -
Executes dropped EXE 7 IoCs
Processes:
XXMBK.exeSSJK.exeRTWorkQ.exeCDGH.exeRTWorkQ.exeRTWorkQ.module.exeRTWorkQ.exepid process 2520 XXMBK.exe 2872 SSJK.exe 2532 RTWorkQ.exe 3068 CDGH.exe 2632 RTWorkQ.exe 4016 RTWorkQ.module.exe 3736 RTWorkQ.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exe upx C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exe upx behavioral2/memory/4016-153-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
XXMBK.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation XXMBK.exe -
Loads dropped DLL 2 IoCs
Processes:
RTWorkQ.exepid process 2532 RTWorkQ.exe 2532 RTWorkQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ipapi.co 24 ipapi.co 47 ipapi.co -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\SSJK.exe autoit_exe C:\Users\Admin\AppData\Roaming\SSJK.exe autoit_exe C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe autoit_exe C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe autoit_exe C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
RTWorkQ.exeRTWorkQ.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ RTWorkQ.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ RTWorkQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\CDGH.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\CDGH.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\CDGH.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\CDGH.exe nsis_installer_2 -
NTFS ADS 2 IoCs
Processes:
SSJK.exeRTWorkQ.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\winmgmts:\localhost\ SSJK.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_dual\winmgmts:\localhost\ RTWorkQ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RTWorkQ.exepid process 2532 RTWorkQ.exe 2532 RTWorkQ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RTWorkQ.module.exedescription pid process Token: SeRestorePrivilege 4016 RTWorkQ.module.exe Token: 35 4016 RTWorkQ.module.exe Token: SeSecurityPrivilege 4016 RTWorkQ.module.exe Token: SeSecurityPrivilege 4016 RTWorkQ.module.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exeXXMBK.exeSSJK.exeRTWorkQ.exedescription pid process target process PID 2416 wrote to memory of 2520 2416 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe XXMBK.exe PID 2416 wrote to memory of 2520 2416 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe XXMBK.exe PID 2416 wrote to memory of 2520 2416 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe XXMBK.exe PID 2520 wrote to memory of 2872 2520 XXMBK.exe SSJK.exe PID 2520 wrote to memory of 2872 2520 XXMBK.exe SSJK.exe PID 2520 wrote to memory of 2872 2520 XXMBK.exe SSJK.exe PID 2872 wrote to memory of 2532 2872 SSJK.exe RTWorkQ.exe PID 2872 wrote to memory of 2532 2872 SSJK.exe RTWorkQ.exe PID 2872 wrote to memory of 2532 2872 SSJK.exe RTWorkQ.exe PID 2416 wrote to memory of 3068 2416 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe CDGH.exe PID 2416 wrote to memory of 3068 2416 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe CDGH.exe PID 2416 wrote to memory of 3068 2416 1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe CDGH.exe PID 2532 wrote to memory of 4016 2532 RTWorkQ.exe RTWorkQ.module.exe PID 2532 wrote to memory of 4016 2532 RTWorkQ.exe RTWorkQ.module.exe PID 2532 wrote to memory of 4016 2532 RTWorkQ.exe RTWorkQ.module.exe PID 2532 wrote to memory of 2520 2532 RTWorkQ.exe attrib.exe PID 2532 wrote to memory of 2520 2532 RTWorkQ.exe attrib.exe PID 2532 wrote to memory of 2520 2532 RTWorkQ.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe"C:\Users\Admin\AppData\Local\Temp\1ecf815aba32883152cea3a22a8fb2633d948c434d9a746ed0025a4037bb5ee2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\XXMBK.exe"C:\Users\Admin\AppData\Local\Temp\XXMBK.exe" -s -pfsdgsdfvsdzcxfsDC2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\SSJK.exe"C:\Users\Admin\AppData\Roaming\SSJK.exe"3⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_dual\ENU_801FE97294A87C4E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_dual\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_dual"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CDGH.exe"C:\Users\Admin\AppData\Local\Temp\CDGH.exe"2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2632
-
C:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exeC:\Users\Admin\AppData\Roaming\amd64_dual\RTWorkQ.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5439e839b6ea367af00f7b99c0e9636a4
SHA172546bc18281613ce3f0a9138136ae33fe4559e8
SHA256cfdf8ea497068d151b91d122e0daa28e08a919d39cd0a061f0a66353d4fe3637
SHA512eaf8471418db8abb3488e3d11a097ee50c0f5cd44800d29a692fa70a6ec56865ac83ddb98373844801bc8978fa3a42373e22308a7a879c167d9c0a4596aa431b
-
Filesize
35KB
MD5439e839b6ea367af00f7b99c0e9636a4
SHA172546bc18281613ce3f0a9138136ae33fe4559e8
SHA256cfdf8ea497068d151b91d122e0daa28e08a919d39cd0a061f0a66353d4fe3637
SHA512eaf8471418db8abb3488e3d11a097ee50c0f5cd44800d29a692fa70a6ec56865ac83ddb98373844801bc8978fa3a42373e22308a7a879c167d9c0a4596aa431b
-
Filesize
1.6MB
MD5eceea2d65991ed05f6954752e9d036e9
SHA189be5d1bba918a61412b626b9c19fb07150b59d6
SHA25675eb9f06b32f7a10dbd995e7a7422f9ba15ca292c4af18b43b64dcaa14cea407
SHA512d3e5ac4b5bc39ae0bf1e5122b951f8bbaa58fbdc524a88a475e99dc54e1471a2f3629b4a9af7dd4ad25f092a514d1166c6ecb788fc97c3adde5a079ff1838a3e
-
Filesize
1.6MB
MD5eceea2d65991ed05f6954752e9d036e9
SHA189be5d1bba918a61412b626b9c19fb07150b59d6
SHA25675eb9f06b32f7a10dbd995e7a7422f9ba15ca292c4af18b43b64dcaa14cea407
SHA512d3e5ac4b5bc39ae0bf1e5122b951f8bbaa58fbdc524a88a475e99dc54e1471a2f3629b4a9af7dd4ad25f092a514d1166c6ecb788fc97c3adde5a079ff1838a3e
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
3KB
MD5202e1043e3225d3afbddbf274565a3e6
SHA1c681dc6dc6427488be805917b7efbdedc395d8fa
SHA256cb4b9cbbe836e0fa0be08815d65bc7407d1f12b2034a4b67947a1c8824267d37
SHA512e042a1afc8e881bceb7b742c89d64075f951435d0964e8dd157ad3bfa38de27de4374406937da252ead835b3e0d8d267b42bf8fc49701df13426bcf0edcfcc6c
-
Filesize
50KB
MD55fa838882ccea0706e8c2d0bf54551e5
SHA1b61e91b86c6e4ac170261bb2703d56a976370731
SHA2563bee0d5781dcf58cb42080b251e318f496ffa465c94ca7980377bfaeea5aeff3
SHA5120b1cf52c228646c87782d437e5b4995686ed63d42cde0b2a5fd21e925af1bb5a22cd7e3bbff4137a78f73f890c94c710485c2e9568dac1e7337f1e2aaf432c8f
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
1.8MB
MD5f19b8319668ed8f19956434ca5800731
SHA1f2b6a5bdd18dd933f677ee9e964564dd897b69ba
SHA25645e91d7bcf287f0b543753a8e26907f978d6b663599aa3ac864fe44e2d514f21
SHA51267fc0f512feaec172d0cd192520f3c55a10071ed35b4f0389768627c1951eeb93a91b9f5b1f99486c0836128b11c133aa28f57b3e8932ba9a70f207c685f1361
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02