Analysis
-
max time kernel
139s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25/06/2022, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe
Resource
win7-20220414-en
General
-
Target
6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe
-
Size
1.9MB
-
MD5
e907724e5ddf5a4a13d19da14e9c6854
-
SHA1
165567a043aa24c4fdf0025037bb4eb6443db51d
-
SHA256
6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c
-
SHA512
c6d60bf71e2ac8ba1d49a4cba62ff8c06b6412dcc7a335a7368b09b3a3d48b10c6b39a0f08694cc0fd99b1a7fffe5e490ae87e1ab9b4adc51afc28e5df98b619
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000133d5-86.dat acprotect behavioral1/files/0x00080000000133d5-87.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 400 NlsLexicons0049.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1584 attrib.exe -
resource yara_rule behavioral1/memory/2044-55-0x0000000000170000-0x000000000057F000-memory.dmp upx behavioral1/memory/2044-69-0x0000000000170000-0x000000000057F000-memory.dmp upx behavioral1/memory/2008-70-0x0000000000170000-0x000000000057F000-memory.dmp upx behavioral1/memory/1464-85-0x0000000000170000-0x000000000057F000-memory.dmp upx behavioral1/files/0x00080000000133d5-86.dat upx behavioral1/files/0x00080000000133d5-87.dat upx behavioral1/files/0x0009000000013a15-92.dat upx behavioral1/files/0x0009000000013a15-93.dat upx behavioral1/files/0x0009000000013a15-95.dat upx behavioral1/memory/400-98-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/1576-116-0x0000000000170000-0x000000000057F000-memory.dmp upx behavioral1/memory/788-125-0x0000000000170000-0x000000000057F000-memory.dmp upx behavioral1/memory/788-132-0x0000000000170000-0x000000000057F000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1784 NlsLexicons0049.exe 1784 NlsLexicons0049.exe 1784 NlsLexicons0049.exe 1784 NlsLexicons0049.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ipapi.co 10 ipapi.co -
AutoIT Executable 20 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2008-58-0x0000000000B60000-0x0000000000D35000-memory.dmp autoit_exe behavioral1/memory/2044-63-0x00000000213C0000-0x00000000217CF000-memory.dmp autoit_exe behavioral1/memory/2008-66-0x0000000000B8800A-mapping.dmp autoit_exe behavioral1/memory/2008-68-0x0000000000B60000-0x0000000000D35000-memory.dmp autoit_exe behavioral1/memory/2044-69-0x0000000000170000-0x000000000057F000-memory.dmp autoit_exe behavioral1/memory/1784-75-0x0000000000BB0000-0x0000000000D85000-memory.dmp autoit_exe behavioral1/memory/1784-82-0x0000000000BD800A-mapping.dmp autoit_exe behavioral1/memory/1464-85-0x0000000000170000-0x000000000057F000-memory.dmp autoit_exe behavioral1/memory/1784-84-0x0000000000BB0000-0x0000000000D85000-memory.dmp autoit_exe behavioral1/memory/1784-88-0x0000000061E00000-0x0000000061ED2000-memory.dmp autoit_exe behavioral1/memory/1784-89-0x0000000061E00000-0x0000000061ED2000-memory.dmp autoit_exe behavioral1/memory/1736-107-0x0000000000AF0000-0x0000000000CC5000-memory.dmp autoit_exe behavioral1/memory/1736-114-0x0000000000B1800A-mapping.dmp autoit_exe behavioral1/memory/1576-116-0x0000000000170000-0x000000000057F000-memory.dmp autoit_exe behavioral1/memory/1736-117-0x0000000000AF0000-0x0000000000CC5000-memory.dmp autoit_exe behavioral1/memory/752-122-0x0000000000650000-0x0000000000825000-memory.dmp autoit_exe behavioral1/memory/788-125-0x0000000000170000-0x000000000057F000-memory.dmp autoit_exe behavioral1/memory/752-130-0x000000000067800A-mapping.dmp autoit_exe behavioral1/memory/788-132-0x0000000000170000-0x000000000057F000-memory.dmp autoit_exe behavioral1/memory/752-133-0x0000000000650000-0x0000000000825000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NlsLexicons0049.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ NlsLexicons0049.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2044 set thread context of 2008 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 27 PID 1464 set thread context of 1784 1464 NlsLexicons0049.exe 29 PID 1576 set thread context of 1736 1576 NlsLexicons0049.exe 39 PID 788 set thread context of 752 788 NlsLexicons0049.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\winmgmts:\localhost\ NlsLexicons0049.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1784 NlsLexicons0049.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2008 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 400 NlsLexicons0049.module.exe Token: 35 400 NlsLexicons0049.module.exe Token: SeSecurityPrivilege 400 NlsLexicons0049.module.exe Token: SeSecurityPrivilege 400 NlsLexicons0049.module.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 1464 NlsLexicons0049.exe 1464 NlsLexicons0049.exe 1464 NlsLexicons0049.exe 1576 NlsLexicons0049.exe 1576 NlsLexicons0049.exe 1576 NlsLexicons0049.exe 788 NlsLexicons0049.exe 788 NlsLexicons0049.exe 788 NlsLexicons0049.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 1464 NlsLexicons0049.exe 1464 NlsLexicons0049.exe 1464 NlsLexicons0049.exe 1576 NlsLexicons0049.exe 1576 NlsLexicons0049.exe 1576 NlsLexicons0049.exe 788 NlsLexicons0049.exe 788 NlsLexicons0049.exe 788 NlsLexicons0049.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2008 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 27 PID 2044 wrote to memory of 2008 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 27 PID 2044 wrote to memory of 2008 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 27 PID 2044 wrote to memory of 2008 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 27 PID 2044 wrote to memory of 2008 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 27 PID 2044 wrote to memory of 2008 2044 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 27 PID 2008 wrote to memory of 1464 2008 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 28 PID 2008 wrote to memory of 1464 2008 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 28 PID 2008 wrote to memory of 1464 2008 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 28 PID 2008 wrote to memory of 1464 2008 6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe 28 PID 1464 wrote to memory of 1784 1464 NlsLexicons0049.exe 29 PID 1464 wrote to memory of 1784 1464 NlsLexicons0049.exe 29 PID 1464 wrote to memory of 1784 1464 NlsLexicons0049.exe 29 PID 1464 wrote to memory of 1784 1464 NlsLexicons0049.exe 29 PID 1464 wrote to memory of 1784 1464 NlsLexicons0049.exe 29 PID 1464 wrote to memory of 1784 1464 NlsLexicons0049.exe 29 PID 1784 wrote to memory of 400 1784 NlsLexicons0049.exe 33 PID 1784 wrote to memory of 400 1784 NlsLexicons0049.exe 33 PID 1784 wrote to memory of 400 1784 NlsLexicons0049.exe 33 PID 1784 wrote to memory of 400 1784 NlsLexicons0049.exe 33 PID 1784 wrote to memory of 1584 1784 NlsLexicons0049.exe 35 PID 1784 wrote to memory of 1584 1784 NlsLexicons0049.exe 35 PID 1784 wrote to memory of 1584 1784 NlsLexicons0049.exe 35 PID 1784 wrote to memory of 1584 1784 NlsLexicons0049.exe 35 PID 544 wrote to memory of 1576 544 taskeng.exe 38 PID 544 wrote to memory of 1576 544 taskeng.exe 38 PID 544 wrote to memory of 1576 544 taskeng.exe 38 PID 544 wrote to memory of 1576 544 taskeng.exe 38 PID 1576 wrote to memory of 1736 1576 NlsLexicons0049.exe 39 PID 1576 wrote to memory of 1736 1576 NlsLexicons0049.exe 39 PID 1576 wrote to memory of 1736 1576 NlsLexicons0049.exe 39 PID 1576 wrote to memory of 1736 1576 NlsLexicons0049.exe 39 PID 1576 wrote to memory of 1736 1576 NlsLexicons0049.exe 39 PID 1576 wrote to memory of 1736 1576 NlsLexicons0049.exe 39 PID 544 wrote to memory of 788 544 taskeng.exe 40 PID 544 wrote to memory of 788 544 taskeng.exe 40 PID 544 wrote to memory of 788 544 taskeng.exe 40 PID 544 wrote to memory of 788 544 taskeng.exe 40 PID 788 wrote to memory of 752 788 NlsLexicons0049.exe 41 PID 788 wrote to memory of 752 788 NlsLexicons0049.exe 41 PID 788 wrote to memory of 752 788 NlsLexicons0049.exe 41 PID 788 wrote to memory of 752 788 NlsLexicons0049.exe 41 PID 788 wrote to memory of 752 788 NlsLexicons0049.exe 41 PID 788 wrote to memory of 752 788 NlsLexicons0049.exe 41 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1584 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe"C:\Users\Admin\AppData\Local\Temp\6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe"C:\Users\Admin\AppData\Local\Temp\6faf5ff76303fdc31acbcc8ec9145761a0535b4a4ef75b31fa01311957b56a4c.exe"2⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe"4⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\ENU_687FE978D73A864E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1584
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {64793D76-71E5-4A61-A70B-C1B7B437145A} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe"3⤵
- Drops file in System32 directory
PID:1736
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe"C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.exe"3⤵
- Drops file in System32 directory
PID:752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD588e852712beb1a0ba3db01b43413b3c1
SHA18f230b93eb8c077c3564f5315021f16ae21cf66b
SHA2565d6a00a8b2775f8d2b54acee95579c95acaf45c275a4b3b291904f908036ab6b
SHA512286a72faab72bdad04dc20f3109d11883d0b2da684fce7cad055b1baea00b18796ccbb24c4cc717bdd8dd54eeaf91e961e2a8141de157a29740b62bc8e73eb27
-
Filesize
47KB
MD58ac7455e21ee8150bf1b8206888beaf4
SHA17af5801e28b9e7d81d6e0ec2435c15709470c248
SHA2564ce56d6dbd4b6ed6306af1ac4616ab4c4f5602a2a5c05a0670a58e58d86f7066
SHA51277d14b8fc007d88046f3078f315e4a4ad3d55fdc6759bb1b5309fd1502a88d17af6186126fe37dc38703e3733301225e7ae0f3c3798279cf81fa7203830b9ea5
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..meworkapi.resources\NlsLexicons0049.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02