Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe
Resource
win10v2004-20220414-en
General
-
Target
47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe
-
Size
1.8MB
-
MD5
9130e049de92565fd94684020cfcdad9
-
SHA1
332701ac6a0b868468d02e8e1f4f0995e40affb2
-
SHA256
47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8
-
SHA512
2f8323a3c364fdcadfc1a06b1aee5ce7bedd7b056d913d8a19ad5a26bc33b2274e257713a75d335af0d7460f2a04ff91859c9567dd0ca694cf6304098d636a1e
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000012718-57.dat acprotect behavioral1/files/0x0008000000012718-59.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1204 imapi2.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1884 attrib.exe -
resource yara_rule behavioral1/files/0x0008000000012718-57.dat upx behavioral1/files/0x0008000000012718-59.dat upx behavioral1/memory/112-58-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/files/0x00090000000132f5-61.dat upx behavioral1/files/0x00090000000132f5-60.dat upx behavioral1/files/0x00090000000132f5-63.dat upx behavioral1/memory/1204-66-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/112-70-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 112 imapi2.exe 112 imapi2.exe 112 imapi2.exe 112 imapi2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipapi.co 6 ipapi.co -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ imapi2.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ imapi2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\winmgmts:\localhost\ imapi2.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 112 imapi2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1964 47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1204 imapi2.module.exe Token: 35 1204 imapi2.module.exe Token: SeSecurityPrivilege 1204 imapi2.module.exe Token: SeSecurityPrivilege 1204 imapi2.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1964 wrote to memory of 112 1964 47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe 27 PID 1964 wrote to memory of 112 1964 47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe 27 PID 1964 wrote to memory of 112 1964 47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe 27 PID 1964 wrote to memory of 112 1964 47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe 27 PID 112 wrote to memory of 1204 112 imapi2.exe 31 PID 112 wrote to memory of 1204 112 imapi2.exe 31 PID 112 wrote to memory of 1204 112 imapi2.exe 31 PID 112 wrote to memory of 1204 112 imapi2.exe 31 PID 112 wrote to memory of 1884 112 imapi2.exe 33 PID 112 wrote to memory of 1884 112 imapi2.exe 33 PID 112 wrote to memory of 1884 112 imapi2.exe 33 PID 112 wrote to memory of 1884 112 imapi2.exe 33 PID 360 wrote to memory of 1504 360 taskeng.exe 36 PID 360 wrote to memory of 1504 360 taskeng.exe 36 PID 360 wrote to memory of 1504 360 taskeng.exe 36 PID 360 wrote to memory of 1504 360 taskeng.exe 36 PID 360 wrote to memory of 1080 360 taskeng.exe 37 PID 360 wrote to memory of 1080 360 taskeng.exe 37 PID 360 wrote to memory of 1080 360 taskeng.exe 37 PID 360 wrote to memory of 1080 360 taskeng.exe 37 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1884 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe"C:\Users\Admin\AppData\Local\Temp\47cc654925b72dc0dfefc34616c1760a680cb30f8973422c7bbc2a550ee1e1b8.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\ENU_687FE975325E824E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1884
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {07CCD7BE-3923-4A04-9250-FF97CBBCF141} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.exe2⤵
- Drops file in System32 directory
PID:1504
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.exe2⤵
- Drops file in System32 directory
PID:1080
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57131dcddc7333aaa6133e4e16235618f
SHA14fb04484cab5a8a3c4bda929f80656428c70a8d6
SHA256f88e8e926294915d1ec205f75463ce5476ff385ea30d1fae04eeb021f5875240
SHA5126abb5f471bcad92cbd46347eef0a393e1534bbf93fc0365f24f4d32b8a49e7dd26efcd93be099b5894e3c40fb03ef57501676cbadd3b8c35a652c7bfba8758f9
-
Filesize
50KB
MD56a56d84c443886e6cc1bf5950f3011a6
SHA1744ac937ff6ead74099e166f1448bea2421da022
SHA2566d0cb97a82debda0dcae5de4e08c7e85454b40a68b0fce6e8e883c7ef1700e68
SHA5128006b0e5498718912ec25804c1ff9d212952066fd8729744a3d3ea09db0adc1c24be3e185cce89607471f9f98fa06914dd5680614bf89a08c754e3f39db2154e
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-b..environment-windows\imapi2.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02