Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe
Resource
win7-20220718-en
General
-
Target
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe
-
Size
1.8MB
-
MD5
41d69ac167f216c1bbbe668a6769facb
-
SHA1
abc3daeeff9df02ae6d251b80fe049ad791aef4b
-
SHA256
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc
-
SHA512
f8c1ce615b7f8dd7de7fe972ffe2a775053c54f8d09a0b585c9085037d687b73f5814fdddffb9a881cc759195452bdb976895ef6c453e33547d0e1a6e0781155
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000900000001331a-57.dat acprotect behavioral1/files/0x000900000001331a-58.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1336 VoipRT.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1944 attrib.exe -
resource yara_rule behavioral1/files/0x000900000001331a-57.dat upx behavioral1/files/0x000900000001331a-58.dat upx behavioral1/files/0x00090000000139ff-60.dat upx behavioral1/files/0x00090000000139ff-61.dat upx behavioral1/files/0x00090000000139ff-63.dat upx behavioral1/memory/1336-65-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/1336-68-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1924 VoipRT.exe 1924 VoipRT.exe 1924 VoipRT.exe 1924 VoipRT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipapi.co 6 ipapi.co -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ VoipRT.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ VoipRT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\winmgmts:\localhost\ VoipRT.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1924 VoipRT.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 880 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1336 VoipRT.module.exe Token: 35 1336 VoipRT.module.exe Token: SeSecurityPrivilege 1336 VoipRT.module.exe Token: SeSecurityPrivilege 1336 VoipRT.module.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 880 wrote to memory of 1924 880 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe 28 PID 880 wrote to memory of 1924 880 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe 28 PID 880 wrote to memory of 1924 880 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe 28 PID 880 wrote to memory of 1924 880 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe 28 PID 1924 wrote to memory of 1336 1924 VoipRT.exe 32 PID 1924 wrote to memory of 1336 1924 VoipRT.exe 32 PID 1924 wrote to memory of 1336 1924 VoipRT.exe 32 PID 1924 wrote to memory of 1336 1924 VoipRT.exe 32 PID 1708 wrote to memory of 1904 1708 taskeng.exe 35 PID 1708 wrote to memory of 1904 1708 taskeng.exe 35 PID 1708 wrote to memory of 1904 1708 taskeng.exe 35 PID 1708 wrote to memory of 1904 1708 taskeng.exe 35 PID 1924 wrote to memory of 1944 1924 VoipRT.exe 36 PID 1924 wrote to memory of 1944 1924 VoipRT.exe 36 PID 1924 wrote to memory of 1944 1924 VoipRT.exe 36 PID 1924 wrote to memory of 1944 1924 VoipRT.exe 36 PID 1708 wrote to memory of 1032 1708 taskeng.exe 38 PID 1708 wrote to memory of 1032 1708 taskeng.exe 38 PID 1708 wrote to memory of 1032 1708 taskeng.exe 38 PID 1708 wrote to memory of 1032 1708 taskeng.exe 38 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1944 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe"C:\Users\Admin\AppData\Local\Temp\4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\ENU_687FE97C395F5A4E9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1944
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0DDBAD92-38D0-4C8C-8E6A-CF2DCE0EEDB5} S-1-5-21-3762437355-3468409815-1164039494-1000:TZEOUYSL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exe2⤵
- Drops file in System32 directory
PID:1904
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exe2⤵
- Drops file in System32 directory
PID:1032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551b376c55abb61cb02304f25089b5a0f
SHA1ad42c74a4d2a1747ea2aae87ed485840d1fbf2c4
SHA256501c10bf94df97ead371cb44cebea8df4c46b24a360515fd0421eb4294c2ec3e
SHA512d06ba5b0d006776cb3f9cf7f937c1e5dca08f90a35e29c67af85ebce8f8a2c0bc96d4f33dab28beba6070269cd0cebbcd8af6490149d866d0464b338fc4b5c7c
-
Filesize
45KB
MD53fecaeb4fcc595281885752f801a833d
SHA1d46ac15cb810c154b5a8e92ddb02b583d391f568
SHA256477dc4eba79e2cc6805eb66d1295d3c995da07527d328bf59931194490cfde52
SHA5128cc4c412f01fb38246e081fc13b78a05c65e8274206b3565c35d06cd7db252ca9d4fb25bbb76e7571a81d886c0739ceb96a61c085cd629b37b7a702e0f46a40e
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02