Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
17-07-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe
Resource
win7-20220715-en
General
-
Target
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe
-
Size
1.8MB
-
MD5
f7a092a680badc41fa455fd637af6c49
-
SHA1
3e983dcc0388692ca0a9003bb2518bd5a40cd9af
-
SHA256
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc
-
SHA512
dea3159d969b3ed98b2770c11c3fce0684c88923e222e26fd6f59f4ecaefccfa71beb024f1d4ea6fd0c5b212a3325b61e633631118998629a256d97ce997437e
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
bcd.module.exepid process 1596 bcd.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exe upx \Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exe upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exe upx behavioral1/memory/1596-66-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
bcd.exepid process 1984 bcd.exe 1984 bcd.exe 1984 bcd.exe 1984 bcd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ipapi.co 6 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
bcd.exebcd.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ bcd.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ bcd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exebcd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\winmgmts:\localhost\ bcd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bcd.exepid process 1984 bcd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exepid process 852 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
bcd.module.exedescription pid process Token: SeRestorePrivilege 1596 bcd.module.exe Token: 35 1596 bcd.module.exe Token: SeSecurityPrivilege 1596 bcd.module.exe Token: SeSecurityPrivilege 1596 bcd.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exebcd.exetaskeng.exedescription pid process target process PID 852 wrote to memory of 1984 852 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe bcd.exe PID 852 wrote to memory of 1984 852 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe bcd.exe PID 852 wrote to memory of 1984 852 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe bcd.exe PID 852 wrote to memory of 1984 852 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe bcd.exe PID 1984 wrote to memory of 1596 1984 bcd.exe bcd.module.exe PID 1984 wrote to memory of 1596 1984 bcd.exe bcd.module.exe PID 1984 wrote to memory of 1596 1984 bcd.exe bcd.module.exe PID 1984 wrote to memory of 1596 1984 bcd.exe bcd.module.exe PID 1984 wrote to memory of 2040 1984 bcd.exe attrib.exe PID 1984 wrote to memory of 2040 1984 bcd.exe attrib.exe PID 1984 wrote to memory of 2040 1984 bcd.exe attrib.exe PID 1984 wrote to memory of 2040 1984 bcd.exe attrib.exe PID 1988 wrote to memory of 1364 1988 taskeng.exe bcd.exe PID 1988 wrote to memory of 1364 1988 taskeng.exe bcd.exe PID 1988 wrote to memory of 1364 1988 taskeng.exe bcd.exe PID 1988 wrote to memory of 1364 1988 taskeng.exe bcd.exe PID 1988 wrote to memory of 984 1988 taskeng.exe bcd.exe PID 1988 wrote to memory of 984 1988 taskeng.exe bcd.exe PID 1988 wrote to memory of 984 1988 taskeng.exe bcd.exe PID 1988 wrote to memory of 984 1988 taskeng.exe bcd.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe"C:\Users\Admin\AppData\Local\Temp\52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\ENU_687FE97579347BEE9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2040
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CE15D579-8896-4B9E-9C93-96B7F072B42D} S-1-5-21-3440072777-2118400376-1759599358-1000:NKWDSIWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exe2⤵
- Drops file in System32 directory
PID:1364
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exe2⤵
- Drops file in System32 directory
PID:984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD541332c270c4bedd3a2de2d5806cd49c5
SHA14d22ee89ff99790e9f427cd8bb2190379e73f054
SHA256f2b91cee9dddc187c5e47ea4a0bc6d7c6e239db255901ae7e1c4c2f734597161
SHA5128a10a9fcf5cefd1d6b10bb08629de53b8909b9bf220d0678d7e4a2d354940e1dbcb287048dbb853ba7666f701b7132b2aa38b686e2de1f0b2484b0cb055091a9
-
Filesize
47KB
MD5df1a8eaef759a47ac3540b49b7933e84
SHA16eb56035a077a4e8d26e69e2f400cf98b6bb17c6
SHA256be960ff45b50e14dc2301a3a4abb9b10c9119f80bff4d4fa868a793b1d56a94f
SHA512cb19669ebda8c12f893deb6db58d38fc95db4e6b132b6f2cb939afd0a37d2f5edb9708ec87558c086f7717804357d988357401f00ced641a9e26ec3e2aeba924
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02