Analysis
-
max time kernel
138s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 17:49
Static task
static1
Behavioral task
behavioral1
Sample
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe
Resource
win7-20220414-en
General
-
Target
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe
-
Size
2.3MB
-
MD5
2eb99757f1af96d5fd9ec9ecf75f1eef
-
SHA1
822f9bfe95ec15e834deae9124ee7883c70d302e
-
SHA256
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee
-
SHA512
17b0db88f6625e369d6d4e7eef58ec6a66b16aa4d7474527bbb4cfd09602cc058b81148d033acecf319c87785e80e6189d47ce20b4954f6a25d37a552c40891b
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
hcproviders.module.exepid process 4340 hcproviders.module.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe upx behavioral2/memory/4340-141-0x0000000000870000-0x00000000008FF000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
hcproviders.exepid process 4068 hcproviders.exe 4068 hcproviders.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 ipapi.co -
Drops file in System32 directory 1 IoCs
Processes:
hcproviders.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ hcproviders.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exehcproviders.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\winmgmts:\localhost\ hcproviders.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
hcproviders.exepid process 4068 hcproviders.exe 4068 hcproviders.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exepid process 2984 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
hcproviders.module.exedescription pid process Token: SeRestorePrivilege 4340 hcproviders.module.exe Token: 35 4340 hcproviders.module.exe Token: SeSecurityPrivilege 4340 hcproviders.module.exe Token: SeSecurityPrivilege 4340 hcproviders.module.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exehcproviders.exedescription pid process target process PID 2984 wrote to memory of 4068 2984 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe hcproviders.exe PID 2984 wrote to memory of 4068 2984 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe hcproviders.exe PID 2984 wrote to memory of 4068 2984 44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe hcproviders.exe PID 4068 wrote to memory of 4340 4068 hcproviders.exe hcproviders.module.exe PID 4068 wrote to memory of 4340 4068 hcproviders.exe hcproviders.module.exe PID 4068 wrote to memory of 4340 4068 hcproviders.exe hcproviders.module.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe"C:\Users\Admin\AppData\Local\Temp\44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\41646D696E544C57484A54594257494E5F313058.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe1⤵
- Drops file in System32 directory
PID:1716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f2103cfd1d17b332813058f652cc796d
SHA184edbf9933456cdd90b91b7f0be72861ff3642e0
SHA25651f85385905bc9e82da29b9dbebf850d0876dc68a0256a5930cf1391134116fb
SHA512d28539f4e752ec66edbf49b767de4944e821d6c5c02fb257b3b19ca54ffb0ddfa88c3ef8b9b2f183538ac50d5539db78f41ab499c345139c603687746b189c21
-
Filesize
49KB
MD581982f1a32f3178dc1920084e327b59e
SHA12bc30173f9f8602e0b79f6593a1b4dfc490b331e
SHA256ca3cd94932015e6e5346db19e2efcdf29eaa6cfbea25a67cce7f737d649b7a95
SHA512bff8a9e9a6bfc11483eca253b391e1fd33e214923335b3705bae83191aedd867f0e15b223868539d0f845fb8605700114c59e9a2e8216d31c02515d3a78abc10
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe
Filesize221KB
MD5965119091c292c96af5011f40dae87a5
SHA185708f7bab07528f1b6e9dfbf64648189a513043
SHA2561ad53eed4d91c6835551aa997399b6054cdf53bca33f103aec24afe46547186b
SHA512244ef9a88308f9a1d738bb1fbf9f6125a4f25ef5665df85adff1985068f92a1d9714785eb63183fede6f1fd9c1420eecfa185a971c99ab835a8f9ea770d94629
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll
Filesize358KB
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll
Filesize358KB
MD571000fc34d27d2016846743d1dcce548
SHA1f75456389b8c0dd0398bb3d58f0b4745d862e1b5
SHA256bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03
SHA512d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c