Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220715-en -
resource tags
arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2022 01:31
Static task
static1
Behavioral task
behavioral1
Sample
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe
Resource
win7-20220715-en
General
-
Target
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe
-
Size
1.8MB
-
MD5
f7a092a680badc41fa455fd637af6c49
-
SHA1
3e983dcc0388692ca0a9003bb2518bd5a40cd9af
-
SHA256
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc
-
SHA512
dea3159d969b3ed98b2770c11c3fce0684c88923e222e26fd6f59f4ecaefccfa71beb024f1d4ea6fd0c5b212a3325b61e633631118998629a256d97ce997437e
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
bcd.module.exepid process 4716 bcd.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll upx behavioral2/memory/3772-132-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral2/memory/3772-135-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exe upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exe upx behavioral2/memory/4716-142-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
bcd.exepid process 3772 bcd.exe 3772 bcd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ipapi.co 12 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
bcd.exebcd.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ bcd.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ bcd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exebcd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\winmgmts:\localhost\ bcd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bcd.exepid process 3772 bcd.exe 3772 bcd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exepid process 2420 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
bcd.module.exedescription pid process Token: SeRestorePrivilege 4716 bcd.module.exe Token: 35 4716 bcd.module.exe Token: SeSecurityPrivilege 4716 bcd.module.exe Token: SeSecurityPrivilege 4716 bcd.module.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exebcd.exedescription pid process target process PID 2420 wrote to memory of 3772 2420 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe bcd.exe PID 2420 wrote to memory of 3772 2420 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe bcd.exe PID 2420 wrote to memory of 3772 2420 52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe bcd.exe PID 3772 wrote to memory of 4716 3772 bcd.exe bcd.module.exe PID 3772 wrote to memory of 4716 3772 bcd.exe bcd.module.exe PID 3772 wrote to memory of 4716 3772 bcd.exe bcd.module.exe PID 3772 wrote to memory of 448 3772 bcd.exe attrib.exe PID 3772 wrote to memory of 448 3772 bcd.exe attrib.exe PID 3772 wrote to memory of 448 3772 bcd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe"C:\Users\Admin\AppData\Local\Temp\52e7e7bf145dd3fa5003e54d28453682164a2a0c020863d206541a53a8de87bc.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\ENU_801FE973DC4F213E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:448
-
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exe1⤵
- Drops file in System32 directory
PID:4548
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.exe1⤵
- Drops file in System32 directory
PID:3736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5069bc76d48e7076733f71fe614b32432
SHA19ebb269a10e7f461c1d88880c7a21925c4e91e50
SHA256b41ada04285a9063b3fae2986e346703631274470226563340f6757b24aeb689
SHA512c876bcb1cfc23cd54f95cd448f63734d209816aff69cfc0ff434c87f0de71d626b3301ca692bf16a9981b7af9125db67674221a925236c444535fb5e7870e726
-
Filesize
48KB
MD53b27c508e8651501904d72cd6487953b
SHA1458654496495f3e6817c97a3c7afeef4322d1c4d
SHA2561414de91f00beec669634e9a62e7a8c8569d4212b2e48bf262dd15767b9c021f
SHA512eeca226e197ddd8bb2f9c1de160f1eab00c7d71c0b7838c79ab9bbe642bac87764dce754cd6622f47d9d8b03d873c7e32f37a67f7fada5976201c7a8d70bb8e7
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-s..iprovider.resources\bcd.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02