Analysis

  • max time kernel
    138s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    07-07-2022 17:49

General

  • Target

    44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe

  • Size

    2.3MB

  • MD5

    2eb99757f1af96d5fd9ec9ecf75f1eef

  • SHA1

    822f9bfe95ec15e834deae9124ee7883c70d302e

  • SHA256

    44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee

  • SHA512

    17b0db88f6625e369d6d4e7eef58ec6a66b16aa4d7474527bbb4cfd09602cc058b81148d033acecf319c87785e80e6189d47ce20b4954f6a25d37a552c40891b

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\Information.txt

Family

qulab

Ransom Note
# /===============================\ # |=== QULAB CLIPPER + STEALER ===| # |===============================| # |==== BUY CLIPPER + STEALER ====| # |=== http://teleg.run/QulabZ ===| # \===============================/ Date: 07.07.2022, 20:29:05 OS: Windows 10 X64 / Build: 19041 UserName: Admin ComputerName: TLWHJTYB Processor: Intel Core Processor (Broadwell) VideoCard: Microsoft Basic Display Adapter Memory: 4.00 Gb KeyBoard Layout ID: 00000409 Resolution: 1280x720x32, 64 GHz Other Information: <error> Soft / Windows Components / Windows Updates: - Google Chrome - Microsoft Edge - Microsoft Edge Update - Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.61030 - Java Auto Updater - Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.30.30704 - Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.30.30704 - Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.40660 - Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.40660 - Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 - Adobe Acrobat Reader DC - Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.61030 - Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.61030 - Microsoft Visual C++ 2022 X86 Additional Runtime - 14.30.30704 - Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 - Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.40660 - Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.40660 - Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 - Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.30.30704 Process List: - [System Process] / PID: 0 - System / PID: 4 - Registry / PID: 92 - smss.exe / PID: 352 - csrss.exe / PID: 436 - csrss.exe / PID: 528 - wininit.exe / PID: 536 - winlogon.exe / PID: 596 - services.exe / PID: 668 - lsass.exe / PID: 680 - svchost.exe / PID: 788 - fontdrvhost.exe / PID: 808 - fontdrvhost.exe / PID: 812 - svchost.exe / PID: 912 - svchost.exe / PID: 968 - dwm.exe / PID: 312 - svchost.exe / PID: 748 - svchost.exe / PID: 664 - svchost.exe / PID: 876 - svchost.exe / PID: 1044 - svchost.exe / PID: 1052 - svchost.exe / PID: 1136 - svchost.exe / PID: 1172 - svchost.exe / PID: 1252 - svchost.exe / PID: 1272 - svchost.exe / PID: 1292 - svchost.exe / PID: 1420 - svchost.exe / PID: 1428 - svchost.exe / PID: 1448 - svchost.exe / PID: 1552 - svchost.exe / PID: 1568 - svchost.exe / PID: 1620 - svchost.exe / PID: 1636 - svchost.exe / PID: 1676 - svchost.exe / PID: 1744 - svchost.exe / PID: 1856 - svchost.exe / PID: 1984 - svchost.exe / PID: 2004 - svchost.exe / PID: 2020 - svchost.exe / PID: 1704 - spoolsv.exe / PID: 2068 - svchost.exe / PID: 2108 - svchost.exe / PID: 2140 - svchost.exe / PID: 2184 - svchost.exe / PID: 2320 - svchost.exe / PID: 2328 - svchost.exe / PID: 2424 - OfficeClickToRun.exe / PID: 2432 - svchost.exe / PID: 2472 - svchost.exe / PID: 2492 - svchost.exe / PID: 2508 - svchost.exe / PID: 2520 - sihost.exe / PID: 2688 - svchost.exe / PID: 2752 - taskhostw.exe / PID: 2848 - svchost.exe / PID: 2936 - explorer.exe / PID: 2040 - svchost.exe / PID: 424 - dllhost.exe / PID: 3252 - StartMenuExperienceHost.exe / PID: 3344 - RuntimeBroker.exe / PID: 3416 - SearchApp.exe / PID: 3500 - RuntimeBroker.exe / PID: 3688 - dllhost.exe / PID: 3156 - svchost.exe / PID: 4240 - sppsvc.exe / PID: 3340 - svchost.exe / PID: 3748 - svchost.exe / PID: 4376 - svchost.exe / PID: 2608 - SppExtComObj.Exe / PID: 3364 - svchost.exe / PID: 1128 - svchost.exe / PID: 1476 - svchost.exe / PID: 3432 - svchost.exe / PID: 1616 - SIHClient.exe / PID: 1776 - WmiPrvSE.exe / PID: 3404 - hcproviders.exe / PID: 4068
URLs

http://teleg.run/QulabZ

Signatures

  • Qulab Stealer & Clipper

    Infostealer and clipper created with AutoIt.

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe
    "C:\Users\Admin\AppData\Local\Temp\44e7516802667111df7f421241ded012bf8b66b22d320937ebb2ac44b82c97ee.exe"
    1⤵
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe
      C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe
      2⤵
      • Loads dropped DLL
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe
        C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\41646D696E544C57484A54594257494E5F313058.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\*"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4340
  • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe
    C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.exe
    1⤵
    • Drops file in System32 directory
    PID:1716

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\Information.txt
    Filesize

    3KB

    MD5

    f2103cfd1d17b332813058f652cc796d

    SHA1

    84edbf9933456cdd90b91b7f0be72861ff3642e0

    SHA256

    51f85385905bc9e82da29b9dbebf850d0876dc68a0256a5930cf1391134116fb

    SHA512

    d28539f4e752ec66edbf49b767de4944e821d6c5c02fb257b3b19ca54ffb0ddfa88c3ef8b9b2f183538ac50d5539db78f41ab499c345139c603687746b189c21

  • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\1\Screen.jpg
    Filesize

    49KB

    MD5

    81982f1a32f3178dc1920084e327b59e

    SHA1

    2bc30173f9f8602e0b79f6593a1b4dfc490b331e

    SHA256

    ca3cd94932015e6e5346db19e2efcdf29eaa6cfbea25a67cce7f737d649b7a95

    SHA512

    bff8a9e9a6bfc11483eca253b391e1fd33e214923335b3705bae83191aedd867f0e15b223868539d0f845fb8605700114c59e9a2e8216d31c02515d3a78abc10

  • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.module.exe
    Filesize

    221KB

    MD5

    965119091c292c96af5011f40dae87a5

    SHA1

    85708f7bab07528f1b6e9dfbf64648189a513043

    SHA256

    1ad53eed4d91c6835551aa997399b6054cdf53bca33f103aec24afe46547186b

    SHA512

    244ef9a88308f9a1d738bb1fbf9f6125a4f25ef5665df85adff1985068f92a1d9714785eb63183fede6f1fd9c1420eecfa185a971c99ab835a8f9ea770d94629

  • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll
    Filesize

    358KB

    MD5

    71000fc34d27d2016846743d1dcce548

    SHA1

    f75456389b8c0dd0398bb3d58f0b4745d862e1b5

    SHA256

    bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03

    SHA512

    d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c

  • C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-c..termanagementsnapin\hcproviders.sqlite3.module.dll
    Filesize

    358KB

    MD5

    71000fc34d27d2016846743d1dcce548

    SHA1

    f75456389b8c0dd0398bb3d58f0b4745d862e1b5

    SHA256

    bbc7ca2b74fc5dd4118a11b633ab2ff6e2498f3734f24221d4cb09582f9d4e03

    SHA512

    d382d2c33c3c20f1dbed4874329b0d750be0fe36fe5fde53ceb6d6a173a5f8525a32e45e68befabe7a853ee9cab6e31028016f265d54bf3439ec92a7f76f9d0c

  • memory/4068-130-0x0000000000000000-mapping.dmp
  • memory/4068-133-0x0000000061E00000-0x0000000061ED2000-memory.dmp
    Filesize

    840KB

  • memory/4068-134-0x0000000061E00000-0x0000000061ED2000-memory.dmp
    Filesize

    840KB

  • memory/4068-135-0x0000000061E00000-0x0000000061ED2000-memory.dmp
    Filesize

    840KB

  • memory/4068-136-0x0000000061E00000-0x0000000061ED2000-memory.dmp
    Filesize

    840KB

  • memory/4340-137-0x0000000000000000-mapping.dmp
  • memory/4340-141-0x0000000000870000-0x00000000008FF000-memory.dmp
    Filesize

    572KB