Malware Analysis Report

2024-09-23 04:45

Sample ID 220630-xa928sgcgj
Target 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d
SHA256 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d
Tags
qulab discovery evasion ransomware spyware stealer upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d

Threat Level: Known bad

The file 15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d was found to be: Known bad.

Malicious Activity Summary

qulab discovery evasion ransomware spyware stealer upx

Qulab Stealer & Clipper

ACProtect 1.3x - 1.4x DLL software

Sets file to hidden

Executes dropped EXE

UPX packed file

Reads user/profile data of web browsers

Loads dropped DLL

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks installed software on the system

Looks up external IP address via web service

Drops file in System32 directory

AutoIT Executable

Enumerates physical storage devices

Views/modifies file attributes

Modifies system certificate store

Suspicious use of WriteProcessMemory

NTFS ADS

Suspicious behavior: RenamesItself

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V6

Analysis: static1

Detonation Overview

Reported

2022-06-30 18:40

Signatures

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-06-30 18:40

Reported

2022-06-30 19:05

Platform

win7-20220414-en

Max time kernel

123s

Max time network

181s

Command Line

"C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe"

Signatures

Qulab Stealer & Clipper

stealer qulab

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Looks up external IP address via web service

Description Indicator Process Target
N/A ipapi.co N/A N/A
N/A ipapi.co N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A
File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A

Enumerates physical storage devices

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1828 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1828 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1828 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1828 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1484 wrote to memory of 860 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe
PID 1484 wrote to memory of 860 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe
PID 1484 wrote to memory of 860 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe
PID 1484 wrote to memory of 860 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe
PID 1988 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1988 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1988 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1988 wrote to memory of 2020 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1484 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1740 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1740 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1740 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1740 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 928 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 928 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 928 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 928 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1616 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1616 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1616 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1616 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 992 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 992 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 992 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 992 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 828 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 828 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 828 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1484 wrote to memory of 828 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1988 wrote to memory of 1520 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1988 wrote to memory of 1520 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1988 wrote to memory of 1520 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1988 wrote to memory of 1520 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

Processes

C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe

"C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe"

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\ENU_687FE9762211651E9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\*"

C:\Windows\system32\taskeng.exe

taskeng.exe {D5BC37FA-5177-4553-BBDD-B12646F6524B} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 ipapi.co udp
US 8.8.8.8:53 api.telegram.org udp
US 172.67.69.226:443 ipapi.co tcp
NL 149.154.167.220:443 api.telegram.org tcp
NL 149.154.167.220:443 api.telegram.org tcp
NL 149.154.167.220:443 api.telegram.org tcp
NL 149.154.167.220:443 api.telegram.org tcp
US 194.9.177.123:7508 tcp
US 194.9.177.123:7508 tcp

Files

memory/1828-54-0x0000000076191000-0x0000000076193000-memory.dmp

memory/1484-55-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.sqlite3.module.dll

MD5 8c127ce55bfbb55eb9a843c693c9f240
SHA1 75c462c935a7ff2c90030c684440d61d48bb1858
SHA256 4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512 d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.sqlite3.module.dll

MD5 8c127ce55bfbb55eb9a843c693c9f240
SHA1 75c462c935a7ff2c90030c684440d61d48bb1858
SHA256 4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512 d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

memory/1484-59-0x0000000061E00000-0x0000000061ED2000-memory.dmp

memory/1484-60-0x0000000061E00000-0x0000000061ED2000-memory.dmp

\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe

MD5 946285055913d457fda78a4484266e96
SHA1 668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA256 23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA512 30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe

MD5 946285055913d457fda78a4484266e96
SHA1 668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA256 23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA512 30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

memory/860-63-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe

MD5 946285055913d457fda78a4484266e96
SHA1 668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA256 23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA512 30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\Information.txt

MD5 0a6c61a18194f495326e7c32d497ebc2
SHA1 90bec6a62f9469779beec3b90b2d1363914d7e5d
SHA256 06d6e26a2a87b52bc967cd0ad96e3ac26de63a671aff256f306a9881069bdfa1
SHA512 8a5d731aa23a3dd43b5807cf6005abbea930c53872b7f49077cb4724a801d71d3b43431f4971ca4d34c65709e5590977893a9ded18cb204725a5186a89849f31

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\Screen.jpg

MD5 16a8a1696e2afda80aeb376015167de6
SHA1 474478d796bc10908fced5c67c75f89486be0716
SHA256 607ebe922e4f37daf9cb05bdcbf9656d27568f7accd46cf840539a9e8baa8db7
SHA512 2ecaa5629c9ecc54243ae7ef571105faa503e1ce5ed9105e6cdd571fdf5561f0753456216ecf01beaff5028c3db5bba289d83971d73485494fbcb250179f2d6d

memory/860-67-0x0000000000400000-0x000000000047D000-memory.dmp

memory/1484-68-0x0000000003D80000-0x0000000003DFD000-memory.dmp

memory/1484-69-0x0000000003D80000-0x0000000003DFD000-memory.dmp

memory/1756-71-0x0000000000000000-mapping.dmp

memory/2020-70-0x0000000000000000-mapping.dmp

memory/1740-73-0x0000000000000000-mapping.dmp

memory/928-74-0x0000000000000000-mapping.dmp

memory/1616-75-0x0000000000000000-mapping.dmp

memory/1516-76-0x0000000000000000-mapping.dmp

memory/1720-77-0x0000000000000000-mapping.dmp

memory/1136-78-0x0000000000000000-mapping.dmp

memory/992-79-0x0000000000000000-mapping.dmp

memory/828-80-0x0000000000000000-mapping.dmp

memory/1520-81-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-06-30 18:40

Reported

2022-06-30 19:06

Platform

win10v2004-20220414-en

Max time kernel

150s

Max time network

179s

Command Line

"C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe"

Signatures

Qulab Stealer & Clipper

stealer qulab

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Looks up external IP address via web service

Description Indicator Process Target
N/A ipapi.co N/A N/A
N/A ipapi.co N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A
File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A

Enumerates physical storage devices

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4220 wrote to memory of 1316 N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 4220 wrote to memory of 1316 N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 4220 wrote to memory of 1316 N/A C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe
PID 1316 wrote to memory of 4952 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe
PID 1316 wrote to memory of 4952 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe
PID 1316 wrote to memory of 4952 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe
PID 1316 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1316 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe
PID 1316 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe C:\Windows\SysWOW64\attrib.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe

"C:\Users\Admin\AppData\Local\Temp\15a65dbe519ad4f4d024fd1695cd9fb20cadde7a5fb914b63c104edede4c037d.exe"

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\ENU_801FE97C5F89A74E9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\*"

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources"

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
NL 8.248.1.254:80 tcp
US 52.168.112.67:443 tcp
US 8.8.8.8:53 crl.godaddy.com udp
US 192.124.249.36:80 crl.godaddy.com tcp
IE 20.54.110.249:443 tcp
US 8.8.8.8:53 ipapi.co udp
US 172.67.69.226:443 ipapi.co tcp
US 192.124.249.41:80 crl.godaddy.com tcp
NL 104.97.14.80:80 tcp
NL 104.97.14.80:80 tcp
US 192.124.249.41:80 crl.godaddy.com tcp
US 104.26.8.44:443 ipapi.co tcp
NL 20.190.160.73:443 tcp
NL 20.190.160.73:443 tcp
US 104.26.9.44:443 ipapi.co tcp
NL 20.190.160.67:443 tcp
US 194.9.177.123:7508 tcp
NL 20.190.160.67:443 tcp
NL 20.190.160.67:443 tcp
BE 67.27.153.126:80 tcp
BE 67.27.153.126:80 tcp
NL 20.190.160.2:443 tcp
NL 20.190.160.2:443 tcp
NL 20.190.160.2:443 tcp
NL 20.190.160.2:443 tcp
NL 20.190.160.136:443 tcp
NL 20.190.160.136:443 tcp
NL 20.190.160.136:443 tcp
NL 20.190.160.136:443 tcp

Files

memory/1316-130-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.sqlite3.module.dll

MD5 8c127ce55bfbb55eb9a843c693c9f240
SHA1 75c462c935a7ff2c90030c684440d61d48bb1858
SHA256 4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512 d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.sqlite3.module.dll

MD5 8c127ce55bfbb55eb9a843c693c9f240
SHA1 75c462c935a7ff2c90030c684440d61d48bb1858
SHA256 4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512 d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

memory/1316-133-0x0000000061E00000-0x0000000061ED2000-memory.dmp

memory/1316-134-0x0000000061E00000-0x0000000061ED2000-memory.dmp

memory/1316-135-0x0000000061E00000-0x0000000061ED2000-memory.dmp

memory/1316-136-0x0000000061E00000-0x0000000061ED2000-memory.dmp

memory/4952-137-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe

MD5 946285055913d457fda78a4484266e96
SHA1 668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA256 23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA512 30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\avicap.module.exe

MD5 946285055913d457fda78a4484266e96
SHA1 668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA256 23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA512 30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\Information.txt

MD5 d3f30e231a566d4b8b9bafdb05bf408d
SHA1 de4af90687f73f1f6c14f6ae949a59340558b5b3
SHA256 e66e716b2d5d50b646bef734b1bc88487dfceb7698f950b8a639bd41e848496d
SHA512 186607498cc54eb380b731baebe613b3a9dcb58841446cbb55c0c69b9e35b0accb5c4cec725b9b13a65d832b0fa074c00cbf9e404fdb2f67d78056301467a7da

C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-directui.resources\1\Screen.jpg

MD5 ea237463065e0f5f4a8d411eaf629340
SHA1 84cfbc72ee940091c05d340d889454062305ce4e
SHA256 ad380d8c63608af4f168c6516f996ef8b4ad5f248d311abc4bda2738430dec25
SHA512 427db2e725458de778ae8bfc0fd92d5d72233638da595332bdc30b6f9b3eab3ede09c76c211a81615478d4e4e6e427e3030ebfb441053558063d05ff3c99a745

memory/4952-142-0x0000000000400000-0x000000000047D000-memory.dmp

memory/4676-143-0x0000000000000000-mapping.dmp