Analysis
-
max time kernel
123s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-06-2022 06:42
Static task
static1
Behavioral task
behavioral1
Sample
26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe
Resource
win7-20220414-en
General
-
Target
26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe
-
Size
1.8MB
-
MD5
7971391f80b709bc26b72ebb39f4da44
-
SHA1
9138609c2823f0f286c3e11d72c228b14e79a14b
-
SHA256
26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927
-
SHA512
9c0c19dfbbac72d8c9024b72091cbf781d45008918ea98211d87fae2299ff6debc84e2c1aee96d5a30b1e9f28e1f7391bec03c1f38e1d29d03bb84abbb124100
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
NlsLexicons0049.module.exepid process 884 NlsLexicons0049.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe upx behavioral1/memory/884-67-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
NlsLexicons0049.exepid process 1788 NlsLexicons0049.exe 1788 NlsLexicons0049.exe 1788 NlsLexicons0049.exe 1788 NlsLexicons0049.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipapi.co 6 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
NlsLexicons0049.exeNlsLexicons0049.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NlsLexicons0049.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NlsLexicons0049.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exeNlsLexicons0049.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\winmgmts:\localhost\ NlsLexicons0049.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
NlsLexicons0049.exepid process 1788 NlsLexicons0049.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exepid process 1708 26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
NlsLexicons0049.module.exedescription pid process Token: SeRestorePrivilege 884 NlsLexicons0049.module.exe Token: 35 884 NlsLexicons0049.module.exe Token: SeSecurityPrivilege 884 NlsLexicons0049.module.exe Token: SeSecurityPrivilege 884 NlsLexicons0049.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exeNlsLexicons0049.exetaskeng.exedescription pid process target process PID 1708 wrote to memory of 1788 1708 26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe NlsLexicons0049.exe PID 1708 wrote to memory of 1788 1708 26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe NlsLexicons0049.exe PID 1708 wrote to memory of 1788 1708 26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe NlsLexicons0049.exe PID 1708 wrote to memory of 1788 1708 26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe NlsLexicons0049.exe PID 1788 wrote to memory of 884 1788 NlsLexicons0049.exe NlsLexicons0049.module.exe PID 1788 wrote to memory of 884 1788 NlsLexicons0049.exe NlsLexicons0049.module.exe PID 1788 wrote to memory of 884 1788 NlsLexicons0049.exe NlsLexicons0049.module.exe PID 1788 wrote to memory of 884 1788 NlsLexicons0049.exe NlsLexicons0049.module.exe PID 1788 wrote to memory of 1292 1788 NlsLexicons0049.exe attrib.exe PID 1788 wrote to memory of 1292 1788 NlsLexicons0049.exe attrib.exe PID 1788 wrote to memory of 1292 1788 NlsLexicons0049.exe attrib.exe PID 1788 wrote to memory of 1292 1788 NlsLexicons0049.exe attrib.exe PID 272 wrote to memory of 1740 272 taskeng.exe NlsLexicons0049.exe PID 272 wrote to memory of 1740 272 taskeng.exe NlsLexicons0049.exe PID 272 wrote to memory of 1740 272 taskeng.exe NlsLexicons0049.exe PID 272 wrote to memory of 1740 272 taskeng.exe NlsLexicons0049.exe PID 272 wrote to memory of 1944 272 taskeng.exe NlsLexicons0049.exe PID 272 wrote to memory of 1944 272 taskeng.exe NlsLexicons0049.exe PID 272 wrote to memory of 1944 272 taskeng.exe NlsLexicons0049.exe PID 272 wrote to memory of 1944 272 taskeng.exe NlsLexicons0049.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe"C:\Users\Admin\AppData\Local\Temp\26f74094da97889dce937502510a764403abc38f383ed94ee9acced4bb1d4927.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\ENU_687FE9737473A97E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1292
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BD544D11-289B-4D65-82CD-162C38027CA9} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe2⤵
- Drops file in System32 directory
PID:1740
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe2⤵
- Drops file in System32 directory
PID:1944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52a3a6440671c2e9034a60d56e9383c86
SHA17d4b34e69d40a6f58f8c07087d6c8ca647046cf3
SHA256d880a9b279d24f38812b54ceee76d35d5a03faf537544f958272913204b8b89d
SHA512b7abf5c080c074498c5ebf8801fd8b4a90c299eba7ca02cb1208575a588ef0780f36e4ddd5367673cd0c30425ae3b95f8f6fbbfb0ef417094996383fdfa68d88
-
Filesize
39KB
MD5c742d3fa1ed5fe31b9af6f10f4ad9c5c
SHA1e4415ccfeedbcc793d504e68727f6b91c609f71b
SHA256737f3cf57af2dab385b936f202b5f1b78c5157e03ccf618e7ea1745eb1f9f08e
SHA5128e49bba10cf194ae8f39d1db1534f3484d39dedca4efec8cdadc0d87acad4aecc7f195649aca55ed3f08d2a3cb727037192e847f03e76932a9068f1a48d41191
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02