Analysis
-
max time kernel
161s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 06:16
Static task
static1
Behavioral task
behavioral1
Sample
3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe
Resource
win7-20220414-en
General
-
Target
3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe
-
Size
2.4MB
-
MD5
ca279fdcd6bdc39b7b847135d5de8970
-
SHA1
f3e8f811b9ba5d0d54d72c5562c5a09b64fdeb97
-
SHA256
3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351
-
SHA512
5c0a70b91250261f272d39d7ca4073e9b40d22dc31626dc0e3de567deb86eedeaf2ea91af65830c278c7a26e09b2d721ecbafeb42a41c1695b92cf6af28c7fc8
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000231e2-149.dat acprotect behavioral2/files/0x00070000000231e2-150.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3468 NAPHLPR.module.exe -
Sets file to hidden 1 TTPs 3 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2492 attrib.exe 1828 attrib.exe 316 attrib.exe -
resource yara_rule behavioral2/files/0x00070000000231e2-149.dat upx behavioral2/files/0x00070000000231e2-150.dat upx behavioral2/files/0x00070000000231ec-156.dat upx behavioral2/memory/3468-157-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/files/0x00070000000231ec-158.dat upx behavioral2/memory/3468-161-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4028 NAPHLPR.exe 4028 NAPHLPR.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ipapi.co 26 ipapi.co -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3400-131-0x0000000000E90000-0x0000000001065000-memory.dmp autoit_exe behavioral2/memory/3400-138-0x0000000000E90000-0x0000000001065000-memory.dmp autoit_exe behavioral2/memory/4028-141-0x0000000001600000-0x00000000017D5000-memory.dmp autoit_exe behavioral2/memory/4028-148-0x0000000001600000-0x00000000017D5000-memory.dmp autoit_exe behavioral2/memory/1624-173-0x0000000000E90000-0x0000000001065000-memory.dmp autoit_exe behavioral2/memory/2840-182-0x0000000001600000-0x00000000017D5000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NAPHLPR.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2432 set thread context of 3400 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 81 PID 2624 set thread context of 4028 2624 NAPHLPR.exe 84 PID 5088 set thread context of 1624 5088 NAPHLPR.exe 100 PID 3924 set thread context of 2840 3924 NAPHLPR.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 NAPHLPR.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 NAPHLPR.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\winmgmts:\localhost\ NAPHLPR.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4028 NAPHLPR.exe 4028 NAPHLPR.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3400 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3468 NAPHLPR.module.exe Token: 35 3468 NAPHLPR.module.exe Token: SeSecurityPrivilege 3468 NAPHLPR.module.exe Token: SeSecurityPrivilege 3468 NAPHLPR.module.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 2624 NAPHLPR.exe 2624 NAPHLPR.exe 2624 NAPHLPR.exe 5088 NAPHLPR.exe 5088 NAPHLPR.exe 5088 NAPHLPR.exe 3924 NAPHLPR.exe 3924 NAPHLPR.exe 3924 NAPHLPR.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 2624 NAPHLPR.exe 2624 NAPHLPR.exe 2624 NAPHLPR.exe 5088 NAPHLPR.exe 5088 NAPHLPR.exe 5088 NAPHLPR.exe 3924 NAPHLPR.exe 3924 NAPHLPR.exe 3924 NAPHLPR.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3400 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 81 PID 2432 wrote to memory of 3400 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 81 PID 2432 wrote to memory of 3400 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 81 PID 2432 wrote to memory of 3400 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 81 PID 2432 wrote to memory of 3400 2432 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 81 PID 3400 wrote to memory of 2624 3400 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 83 PID 3400 wrote to memory of 2624 3400 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 83 PID 3400 wrote to memory of 2624 3400 3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe 83 PID 2624 wrote to memory of 4028 2624 NAPHLPR.exe 84 PID 2624 wrote to memory of 4028 2624 NAPHLPR.exe 84 PID 2624 wrote to memory of 4028 2624 NAPHLPR.exe 84 PID 2624 wrote to memory of 4028 2624 NAPHLPR.exe 84 PID 2624 wrote to memory of 4028 2624 NAPHLPR.exe 84 PID 4028 wrote to memory of 3468 4028 NAPHLPR.exe 88 PID 4028 wrote to memory of 3468 4028 NAPHLPR.exe 88 PID 4028 wrote to memory of 3468 4028 NAPHLPR.exe 88 PID 4028 wrote to memory of 1828 4028 NAPHLPR.exe 91 PID 4028 wrote to memory of 1828 4028 NAPHLPR.exe 91 PID 4028 wrote to memory of 1828 4028 NAPHLPR.exe 91 PID 4028 wrote to memory of 316 4028 NAPHLPR.exe 94 PID 4028 wrote to memory of 316 4028 NAPHLPR.exe 94 PID 4028 wrote to memory of 316 4028 NAPHLPR.exe 94 PID 4028 wrote to memory of 2492 4028 NAPHLPR.exe 96 PID 4028 wrote to memory of 2492 4028 NAPHLPR.exe 96 PID 4028 wrote to memory of 2492 4028 NAPHLPR.exe 96 PID 5088 wrote to memory of 1624 5088 NAPHLPR.exe 100 PID 5088 wrote to memory of 1624 5088 NAPHLPR.exe 100 PID 5088 wrote to memory of 1624 5088 NAPHLPR.exe 100 PID 5088 wrote to memory of 1624 5088 NAPHLPR.exe 100 PID 5088 wrote to memory of 1624 5088 NAPHLPR.exe 100 PID 3924 wrote to memory of 2840 3924 NAPHLPR.exe 102 PID 3924 wrote to memory of 2840 3924 NAPHLPR.exe 102 PID 3924 wrote to memory of 2840 3924 NAPHLPR.exe 102 PID 3924 wrote to memory of 2840 3924 NAPHLPR.exe 102 PID 3924 wrote to memory of 2840 3924 NAPHLPR.exe 102 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1828 attrib.exe 316 attrib.exe 2492 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"C:\Users\Admin\AppData\Local\Temp\3a3633855b011a80de5031fcd679c79429ea12cdbc410e91fe37e81fd69c1351.exe"2⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"4⤵
- Loads dropped DLL
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\ENU_801FE97C5F89A74E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1828
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:316
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2492
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"2⤵
- Drops file in System32 directory
PID:1624
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.exe"2⤵PID:2840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b354f4b983452d3ac259b4e5ec201cc9
SHA1eebbd9056fe97b9a49ce01507480f4616a62a6ed
SHA2563acf4ccf081929bcc08a0e5272ab2e2f60f851a2aaf5a67c92683ecedc82614a
SHA5121f3624a8b7fa9a9635862e8851e9e3ca491af160a49587294c83a2969be51f143132b00768f52f45bed3d979bd9f053fe6ea169c3a8681efc70f578cb69c565b
-
Filesize
46KB
MD512bfa7d9ecd0f5259f7d78e2b2b5d688
SHA1b87916e832e2f2a05b6ad5191360963ee3b7004c
SHA2566a3d10f86d3dd982c41922a969800cf251a661abedffa76bd4a87f1b16132b32
SHA512ec690972d383167077ffaed375919306debaa739adfca7fbeb22b4db327ae1a8b66408189120714781c1c309eedd8358baf897c43fe51738304297391e3b9356
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-t..ty-client.resources\NAPHLPR.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02