Analysis
-
max time kernel
150s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 18:40
Static task
static1
Behavioral task
behavioral1
Sample
15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe
Resource
win7-20220414-en
General
-
Target
15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe
-
Size
1.8MB
-
MD5
da0c668fffa87217cfe27c8d89d299ba
-
SHA1
23c32d49602a5a6a469fb06a395a29e85a0c2c57
-
SHA256
15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d
-
SHA512
fa9af20cfad0eeff8e3f0ab8a3e015c2d61384c078df062119744684b52ad1138f60d61fa37578faf0a79c9be0997939aa69af169a18a9bf03eea85a8c5b38f4
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000231e3-131.dat acprotect behavioral2/files/0x00070000000231e3-132.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 4952 avicap.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4676 attrib.exe -
resource yara_rule behavioral2/files/0x00070000000231e3-131.dat upx behavioral2/files/0x00070000000231e3-132.dat upx behavioral2/files/0x00070000000231f4-138.dat upx behavioral2/files/0x00070000000231f4-139.dat upx behavioral2/memory/4952-142-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1316 avicap.exe 1316 avicap.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ipapi.co 41 ipapi.co -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ avicap.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ avicap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 avicap.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 avicap.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\winmgmts:\localhost\ avicap.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 avicap.exe 1316 avicap.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4220 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4952 avicap.module.exe Token: 35 4952 avicap.module.exe Token: SeSecurityPrivilege 4952 avicap.module.exe Token: SeSecurityPrivilege 4952 avicap.module.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4220 wrote to memory of 1316 4220 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe 81 PID 4220 wrote to memory of 1316 4220 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe 81 PID 4220 wrote to memory of 1316 4220 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe 81 PID 1316 wrote to memory of 4952 1316 avicap.exe 84 PID 1316 wrote to memory of 4952 1316 avicap.exe 84 PID 1316 wrote to memory of 4952 1316 avicap.exe 84 PID 1316 wrote to memory of 4676 1316 avicap.exe 86 PID 1316 wrote to memory of 4676 1316 avicap.exe 86 PID 1316 wrote to memory of 4676 1316 avicap.exe 86 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4676 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe"C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe2⤵
- Loads dropped DLL
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\ENU_801FE97C5F89A74E9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4676
-
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe1⤵
- Drops file in System32 directory
PID:3040
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe1⤵
- Drops file in System32 directory
PID:4988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d3f30e231a566d4b8b9bafdb05bf408d
SHA1de4af90687f73f1f6c14f6ae949a59340558b5b3
SHA256e66e716b2d5d50b646bef734b1bc88487dfceb7698f950b8a639bd41e848496d
SHA512186607498cc54eb380b731baebe613b3a9dcb58841446cbb55c0c69b9e35b0accb5c4cec725b9b13a65d832b0fa074c00cbf9e404fdb2f67d78056301467a7da
-
Filesize
47KB
MD5ea237463065e0f5f4a8d411eaf629340
SHA184cfbc72ee940091c05d340d889454062305ce4e
SHA256ad380d8c63608af4f168c6516f996ef8b4ad5f248d311abc4bda2738430dec25
SHA512427db2e725458de778ae8bfc0fd92d5d72233638da595332bdc30b6f9b3eab3ede09c76c211a81615478d4e4e6e427e3030ebfb441053558063d05ff3c99a745
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02