Analysis
-
max time kernel
160s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07/07/2022, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe
Resource
win7-20220414-en
General
-
Target
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe
-
Size
2.3MB
-
MD5
2eb99757f1af96d5fd9ec9ecf75f1eef
-
SHA1
822f9bfe95ec15e834deae9124ee7883c70d302e
-
SHA256
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee
-
SHA512
17b0db88f6625e369d6d4e7eef58ec6a66b16aa4d7474527bbb4cfd09602cc058b81148d033acecf319c87785e80e6189d47ce20b4954f6a25d37a552c40891b
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000600000001467b-57.dat acprotect behavioral1/files/0x000600000001467b-58.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1848 hcproviders.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 836 attrib.exe -
resource yara_rule behavioral1/files/0x000600000001467b-57.dat upx behavioral1/files/0x000600000001467b-58.dat upx behavioral1/files/0x0007000000014b8e-60.dat upx behavioral1/files/0x0007000000014b8e-62.dat upx behavioral1/memory/1848-64-0x00000000010F0000-0x000000000117F000-memory.dmp upx behavioral1/memory/1848-67-0x00000000010F0000-0x000000000117F000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 2008 hcproviders.exe 2008 hcproviders.exe 2008 hcproviders.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipapi.co 7 ipapi.co -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ hcproviders.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ hcproviders.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 hcproviders.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e40f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47419000000010000001000000068cb42b035ea773e52ef50ecf50ec52920000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 hcproviders.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\winmgmts:\localhost\ hcproviders.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2008 hcproviders.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1260 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1848 hcproviders.module.exe Token: 35 1848 hcproviders.module.exe Token: SeSecurityPrivilege 1848 hcproviders.module.exe Token: SeSecurityPrivilege 1848 hcproviders.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2008 1260 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe 27 PID 1260 wrote to memory of 2008 1260 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe 27 PID 1260 wrote to memory of 2008 1260 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe 27 PID 1260 wrote to memory of 2008 1260 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe 27 PID 2008 wrote to memory of 1848 2008 hcproviders.exe 31 PID 2008 wrote to memory of 1848 2008 hcproviders.exe 31 PID 2008 wrote to memory of 1848 2008 hcproviders.exe 31 PID 2008 wrote to memory of 1848 2008 hcproviders.exe 31 PID 2008 wrote to memory of 836 2008 hcproviders.exe 33 PID 2008 wrote to memory of 836 2008 hcproviders.exe 33 PID 2008 wrote to memory of 836 2008 hcproviders.exe 33 PID 2008 wrote to memory of 836 2008 hcproviders.exe 33 PID 1584 wrote to memory of 572 1584 taskeng.exe 36 PID 1584 wrote to memory of 572 1584 taskeng.exe 36 PID 1584 wrote to memory of 572 1584 taskeng.exe 36 PID 1584 wrote to memory of 572 1584 taskeng.exe 36 PID 1584 wrote to memory of 1608 1584 taskeng.exe 37 PID 1584 wrote to memory of 1608 1584 taskeng.exe 37 PID 1584 wrote to memory of 1608 1584 taskeng.exe 37 PID 1584 wrote to memory of 1608 1584 taskeng.exe 37 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 836 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe"C:\Users\Admin\AppData\Local\Temp\44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe2⤵
- Loads dropped DLL
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\41646D696E415556515152524657494E5F375836.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:836
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5E135161-5FED-40B7-A0E0-6331BB6DB3A7} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe2⤵
- Drops file in System32 directory
PID:572
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe2⤵
- Drops file in System32 directory
PID:1608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53a79978282a4a3d5f660d9dd54fa41d2
SHA155df7d30e4aa1d9dcd082032c83a233cee66d200
SHA256bf24a4ed5dd2dbd536a03f591ba8311e18fd9dbd92bc28a8af9e8cfd2b957867
SHA5129464c001abdae4b256e01100009a9181ead9f0cba6ee882eb94cdb974f278c08e15452161cf598809db14e66df14b026438645088aa59186f7853decb48f2df8
-
Filesize
44KB
MD54fd116a0931f34d5c95269cd7cb8b02a
SHA1f9df571690345fe4ddd5895383e86f0eefcb97b9
SHA2565ae3746fb2f88bea79b4458b0db8c3d290bff78ff83b0f483db4d6ed93fa4a96
SHA5128c74d5a3b25292b8d21d691e98b00c95c28dcfbd32c410caeedc2cfde734d20db6ccecfe87ce5d146a3f34a4aabb82b04c31439d1a66d3d6b4bc042040bae71b
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe
Filesize221KB
MD5965119091c292c96af5011f40dae87a5
SHA185708f7bab07528f1b6e9dfbf64648189a513043
SHA2561ad53eed4d91c6835551aa997399b6054cdf53bca33f103aec24afe46547186b
SHA512244ef9a88308f9a1d738bb1fbf9f6125a4f25ef5665df85adff1985068f92a1d9714785eb63183fede6f1fd9c1420eecfa185a971c99ab835a8f9ea770d94629
-
Filesize
221KB
MD5965119091c292c96af5011f40dae87a5
SHA185708f7bab07528f1b6e9dfbf64648189a513043
SHA2561ad53eed4d91c6835551aa997399b6054cdf53bca33f103aec24afe46547186b
SHA512244ef9a88308f9a1d738bb1fbf9f6125a4f25ef5665df85adff1985068f92a1d9714785eb63183fede6f1fd9c1420eecfa185a971c99ab835a8f9ea770d94629
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll
Filesize358KB
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll
Filesize358KB
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c