Analysis
-
max time kernel
127s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 01:39
Static task
static1
Behavioral task
behavioral1
Sample
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe
Resource
win7-20220414-en
General
-
Target
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe
-
Size
3.1MB
-
MD5
a6eb72786833e41037b692d54a08d64b
-
SHA1
209d8da4ba64ad038225b99bd2ae8d38eba63805
-
SHA256
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2
-
SHA512
69261858bb0aa897f5d80c40dbd66de905d347a94b72c98fd6fc6d1d6966d1cc4a2456aaa5a9b596b8a1109b66284bae89d01bbcfb2cb8c40bd2ac17a83cd193
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.sqlite3.module.dll acprotect -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exeddrawex.exeddrawex.exeddrawex.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ddrawex.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ddrawex.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ddrawex.exe -
Executes dropped EXE 1 IoCs
Processes:
ddrawex.module.exepid process 1836 ddrawex.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.module.exe upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.module.exe upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.module.exe upx behavioral1/memory/1836-85-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exeddrawex.exeddrawex.exeddrawex.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddrawex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddrawex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddrawex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddrawex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddrawex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddrawex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exeddrawex.exeddrawex.exeddrawex.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine ddrawex.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine ddrawex.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine ddrawex.exe -
Loads dropped DLL 4 IoCs
Processes:
ddrawex.exepid process 1956 ddrawex.exe 1956 ddrawex.exe 1956 ddrawex.exe 1956 ddrawex.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ipapi.co 7 ipapi.co -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1880-57-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1880-58-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1880-59-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1880-61-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1956-64-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1956-69-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1956-71-0x0000000061E00000-0x0000000061ED2000-memory.dmp autoit_exe behavioral1/memory/1832-74-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1832-75-0x0000000077070000-0x00000000771F0000-memory.dmp autoit_exe behavioral1/memory/1832-77-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1832-76-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe behavioral1/memory/1028-93-0x00000000003E0000-0x0000000000A15000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
ddrawex.exeddrawex.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ ddrawex.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ ddrawex.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exeddrawex.exeddrawex.exeddrawex.exepid process 1880 d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe 1956 ddrawex.exe 1832 ddrawex.exe 1028 ddrawex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exeddrawex.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\winmgmts:\localhost\ ddrawex.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exeddrawex.exeddrawex.exeddrawex.exepid process 1880 d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe 1956 ddrawex.exe 1956 ddrawex.exe 1832 ddrawex.exe 1028 ddrawex.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exepid process 1880 d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
ddrawex.module.exedescription pid process Token: SeRestorePrivilege 1836 ddrawex.module.exe Token: 35 1836 ddrawex.module.exe Token: SeSecurityPrivilege 1836 ddrawex.module.exe Token: SeSecurityPrivilege 1836 ddrawex.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exetaskeng.exeddrawex.exedescription pid process target process PID 1880 wrote to memory of 1956 1880 d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe ddrawex.exe PID 1880 wrote to memory of 1956 1880 d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe ddrawex.exe PID 1880 wrote to memory of 1956 1880 d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe ddrawex.exe PID 1880 wrote to memory of 1956 1880 d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe ddrawex.exe PID 300 wrote to memory of 1832 300 taskeng.exe ddrawex.exe PID 300 wrote to memory of 1832 300 taskeng.exe ddrawex.exe PID 300 wrote to memory of 1832 300 taskeng.exe ddrawex.exe PID 300 wrote to memory of 1832 300 taskeng.exe ddrawex.exe PID 1956 wrote to memory of 1836 1956 ddrawex.exe ddrawex.module.exe PID 1956 wrote to memory of 1836 1956 ddrawex.exe ddrawex.module.exe PID 1956 wrote to memory of 1836 1956 ddrawex.exe ddrawex.module.exe PID 1956 wrote to memory of 1836 1956 ddrawex.exe ddrawex.module.exe PID 1956 wrote to memory of 1168 1956 ddrawex.exe attrib.exe PID 1956 wrote to memory of 1168 1956 ddrawex.exe attrib.exe PID 1956 wrote to memory of 1168 1956 ddrawex.exe attrib.exe PID 1956 wrote to memory of 1168 1956 ddrawex.exe attrib.exe PID 300 wrote to memory of 1028 300 taskeng.exe ddrawex.exe PID 300 wrote to memory of 1028 300 taskeng.exe ddrawex.exe PID 300 wrote to memory of 1028 300 taskeng.exe ddrawex.exe PID 300 wrote to memory of 1028 300 taskeng.exe ddrawex.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe"C:\Users\Admin\AppData\Local\Temp\d688134cbb3f772d9da6dd8900b5ba32ae6fd356671deceee8f211a70d5595a2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ENU_687FE9737473A97E9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1168
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {79F852DD-E945-4CDE-90F3-539369CA4B06} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5575171222ec1017609924d8fcf7890a1
SHA145ae2f09de6f605de5f3a6a5ac5f13f8c28fe61d
SHA2563996e518a712a72063cf984edef3912e397af3020d392f6d9de5a1b695680248
SHA5128676266c4d1dd8bf972c6b9fc6076874237f50988c4dee395d469ead98de4a249aecb186128244ef886b5259cef0d6ed62f66a6c8af7309bbe102dff8dd1ee7e
-
Filesize
48KB
MD51709995dae67bf526bf334e3f2f8ba0b
SHA1c0635114b31726363375b816dd4be82b89369057
SHA2567874614cb76d1f25c7a673b1804a0723d09dd6a008e33d44a17e6c51eb4cedb8
SHA512a56dfe290ff8bbc89ddb5cb0c68222b8c844d092d94489ead3036f5d19f4dfcfdf4f16366ad32986654eb63bcf3ff3512aaaf843b6f5d2533f2c98e839f8001d
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\wow64_microsoft-windows-i..-wow64-setupdll0007\ddrawex.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02