Analysis
-
max time kernel
126s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 06:16
Static task
static1
Behavioral task
behavioral1
Sample
3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe
Resource
win7-20220414-en
General
-
Target
3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe
-
Size
2.4MB
-
MD5
ca279fdcd6bdc39b7b847135d5de8970
-
SHA1
f3e8f811b9ba5d0d54d72c5562c5a09b64fdeb97
-
SHA256
3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351
-
SHA512
5c0a70b91250261f272d39d7ca4073e9b40d22dc31626dc0e3de567deb86eedeaf2ea91af65830c278c7a26e09b2d721ecbafeb42a41c1695b92cf6af28c7fc8
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000012705-81.dat acprotect behavioral1/files/0x0008000000012705-82.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1916 NAPHLPR.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1284 attrib.exe -
resource yara_rule behavioral1/files/0x0008000000012705-81.dat upx behavioral1/files/0x0008000000012705-82.dat upx behavioral1/memory/2040-84-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/2040-83-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/2040-85-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/2040-86-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/files/0x00090000000133d1-87.dat upx behavioral1/files/0x00090000000133d1-88.dat upx behavioral1/files/0x00090000000133d1-90.dat upx behavioral1/memory/1916-93-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 2040 NAPHLPR.exe 2040 NAPHLPR.exe 2040 NAPHLPR.exe 2040 NAPHLPR.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ipapi.co 9 ipapi.co -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1460-57-0x00000000000C0000-0x0000000000295000-memory.dmp autoit_exe behavioral1/memory/1460-64-0x00000000000E800A-mapping.dmp autoit_exe behavioral1/memory/1460-66-0x00000000000C0000-0x0000000000295000-memory.dmp autoit_exe behavioral1/memory/2040-71-0x0000000000780000-0x0000000000955000-memory.dmp autoit_exe behavioral1/memory/2040-78-0x00000000007A800A-mapping.dmp autoit_exe behavioral1/memory/2040-80-0x0000000000780000-0x0000000000955000-memory.dmp autoit_exe behavioral1/memory/1564-102-0x0000000000630000-0x0000000000805000-memory.dmp autoit_exe behavioral1/memory/1564-109-0x000000000065800A-mapping.dmp autoit_exe behavioral1/memory/1564-111-0x0000000000630000-0x0000000000805000-memory.dmp autoit_exe behavioral1/memory/1460-116-0x0000000000650000-0x0000000000825000-memory.dmp autoit_exe behavioral1/memory/1460-123-0x000000000067800A-mapping.dmp autoit_exe behavioral1/memory/1460-125-0x0000000000650000-0x0000000000825000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NAPHLPR.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NAPHLPR.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1040 set thread context of 1460 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 27 PID 1700 set thread context of 2040 1700 NAPHLPR.exe 29 PID 1340 set thread context of 1564 1340 NAPHLPR.exe 39 PID 2000 set thread context of 1460 2000 NAPHLPR.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\winmgmts:\localhost\ NAPHLPR.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 NAPHLPR.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1460 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1916 NAPHLPR.module.exe Token: 35 1916 NAPHLPR.module.exe Token: SeSecurityPrivilege 1916 NAPHLPR.module.exe Token: SeSecurityPrivilege 1916 NAPHLPR.module.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 1700 NAPHLPR.exe 1700 NAPHLPR.exe 1700 NAPHLPR.exe 1340 NAPHLPR.exe 1340 NAPHLPR.exe 1340 NAPHLPR.exe 2000 NAPHLPR.exe 2000 NAPHLPR.exe 2000 NAPHLPR.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 1700 NAPHLPR.exe 1700 NAPHLPR.exe 1700 NAPHLPR.exe 1340 NAPHLPR.exe 1340 NAPHLPR.exe 1340 NAPHLPR.exe 2000 NAPHLPR.exe 2000 NAPHLPR.exe 2000 NAPHLPR.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1040 wrote to memory of 1460 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 27 PID 1040 wrote to memory of 1460 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 27 PID 1040 wrote to memory of 1460 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 27 PID 1040 wrote to memory of 1460 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 27 PID 1040 wrote to memory of 1460 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 27 PID 1040 wrote to memory of 1460 1040 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 27 PID 1460 wrote to memory of 1700 1460 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 28 PID 1460 wrote to memory of 1700 1460 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 28 PID 1460 wrote to memory of 1700 1460 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 28 PID 1460 wrote to memory of 1700 1460 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 28 PID 1700 wrote to memory of 2040 1700 NAPHLPR.exe 29 PID 1700 wrote to memory of 2040 1700 NAPHLPR.exe 29 PID 1700 wrote to memory of 2040 1700 NAPHLPR.exe 29 PID 1700 wrote to memory of 2040 1700 NAPHLPR.exe 29 PID 1700 wrote to memory of 2040 1700 NAPHLPR.exe 29 PID 1700 wrote to memory of 2040 1700 NAPHLPR.exe 29 PID 2040 wrote to memory of 1916 2040 NAPHLPR.exe 33 PID 2040 wrote to memory of 1916 2040 NAPHLPR.exe 33 PID 2040 wrote to memory of 1916 2040 NAPHLPR.exe 33 PID 2040 wrote to memory of 1916 2040 NAPHLPR.exe 33 PID 2040 wrote to memory of 1284 2040 NAPHLPR.exe 35 PID 2040 wrote to memory of 1284 2040 NAPHLPR.exe 35 PID 2040 wrote to memory of 1284 2040 NAPHLPR.exe 35 PID 2040 wrote to memory of 1284 2040 NAPHLPR.exe 35 PID 1036 wrote to memory of 1340 1036 taskeng.exe 38 PID 1036 wrote to memory of 1340 1036 taskeng.exe 38 PID 1036 wrote to memory of 1340 1036 taskeng.exe 38 PID 1036 wrote to memory of 1340 1036 taskeng.exe 38 PID 1340 wrote to memory of 1564 1340 NAPHLPR.exe 39 PID 1340 wrote to memory of 1564 1340 NAPHLPR.exe 39 PID 1340 wrote to memory of 1564 1340 NAPHLPR.exe 39 PID 1340 wrote to memory of 1564 1340 NAPHLPR.exe 39 PID 1340 wrote to memory of 1564 1340 NAPHLPR.exe 39 PID 1340 wrote to memory of 1564 1340 NAPHLPR.exe 39 PID 1036 wrote to memory of 2000 1036 taskeng.exe 40 PID 1036 wrote to memory of 2000 1036 taskeng.exe 40 PID 1036 wrote to memory of 2000 1036 taskeng.exe 40 PID 1036 wrote to memory of 2000 1036 taskeng.exe 40 PID 2000 wrote to memory of 1460 2000 NAPHLPR.exe 41 PID 2000 wrote to memory of 1460 2000 NAPHLPR.exe 41 PID 2000 wrote to memory of 1460 2000 NAPHLPR.exe 41 PID 2000 wrote to memory of 1460 2000 NAPHLPR.exe 41 PID 2000 wrote to memory of 1460 2000 NAPHLPR.exe 41 PID 2000 wrote to memory of 1460 2000 NAPHLPR.exe 41 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1284 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"2⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"4⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\ENU_687FE978D73A864E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1284
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {441ED35D-117B-454F-839F-42123461DFB9} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"3⤵
- Drops file in System32 directory
PID:1564
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"3⤵
- Drops file in System32 directory
PID:1460
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5be653cc67df80bdeee409aecddc1876f
SHA1b38071652663b4c065608e618d07c661c055bfe8
SHA2561d55e5d948db45e6524f672c85ea59174f1246f136d8c67ec7ae6b005abf401c
SHA5127d9af2270fce1756e0a4a7b78091ec68ae5b1e7ba949dab6196a7cb8d9e2f59caa81ded7980377ed23d753c02824e5afca95097dc19c20816ed1af678daee1b8
-
Filesize
45KB
MD5ce599b0766239e284bb7c9f2ffb2e805
SHA1dfbcf08713734cc5fca7e517821da338b9070e2d
SHA2567d7f531b2048e62fb029cb9b2de8e826258412608101f1fab6f5b6e59274c089
SHA5127bc4aec2621db42c1cc2776b6190736d4823494c74c609eb7908e6f01482259a04587b7099c25a0726a69bdd17019c3d94d0016e0f7dc5fac2bb06089ced26e0
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02