Analysis
-
max time kernel
123s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe
Resource
win7-20220718-en
General
-
Target
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe
-
Size
1.8MB
-
MD5
41d69ac167f216c1bbbe668a6769facb
-
SHA1
abc3daeeff9df02ae6d251b80fe049ad791aef4b
-
SHA256
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc
-
SHA512
f8c1ce615b7f8dd7de7fe972ffe2a775053c54f8d09a0b585c9085037d687b73f5814fdddffb9a881cc759195452bdb976895ef6c453e33547d0e1a6e0781155
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
VoipRT.module.exepid process 2032 VoipRT.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.module.exe upx behavioral2/memory/2032-137-0x0000000000400000-0x000000000047D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.module.exe upx behavioral2/memory/2032-141-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
VoipRT.exepid process 2976 VoipRT.exe 2976 VoipRT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ipapi.co 19 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
VoipRT.exeVoipRT.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ VoipRT.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ VoipRT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exeVoipRT.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\winmgmts:\localhost\ VoipRT.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
VoipRT.exepid process 2976 VoipRT.exe 2976 VoipRT.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exepid process 1736 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
VoipRT.module.exedescription pid process Token: SeRestorePrivilege 2032 VoipRT.module.exe Token: 35 2032 VoipRT.module.exe Token: SeSecurityPrivilege 2032 VoipRT.module.exe Token: SeSecurityPrivilege 2032 VoipRT.module.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exeVoipRT.exedescription pid process target process PID 1736 wrote to memory of 2976 1736 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe VoipRT.exe PID 1736 wrote to memory of 2976 1736 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe VoipRT.exe PID 1736 wrote to memory of 2976 1736 4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe VoipRT.exe PID 2976 wrote to memory of 2032 2976 VoipRT.exe VoipRT.module.exe PID 2976 wrote to memory of 2032 2976 VoipRT.exe VoipRT.module.exe PID 2976 wrote to memory of 2032 2976 VoipRT.exe VoipRT.module.exe PID 2976 wrote to memory of 2484 2976 VoipRT.exe attrib.exe PID 2976 wrote to memory of 2484 2976 VoipRT.exe attrib.exe PID 2976 wrote to memory of 2484 2976 VoipRT.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe"C:\Users\Admin\AppData\Local\Temp\4ef95b648698b364dca472ebf7ef0a4cdc18bfbb516eb857b90e52dcd32a4cfc.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\ENU_801FE970A758A6AE9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2484
-
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exe1⤵
- Drops file in System32 directory
PID:2664
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-rastls.resources\VoipRT.exe1⤵
- Drops file in System32 directory
PID:3700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD594b8a755a7df8c1ebe5ba2ebacca78a4
SHA1f57f43cac65be1de8b9c4be542edcabf5e7bb2c9
SHA256e794a75c4e3c7be6e12865d54e3c4fac1ea26427e2c40e7a3a2ddef267b91279
SHA5121dfced25c12ef6835f864dfbda7a716b669b629c9530407d78eb74b9e72e65c19ac5607b74ad24bd58a42075bca44302be0855bd71a139fbd1ccf3423bbe5047
-
Filesize
51KB
MD5c56ba2d80377f1c7e73c237fc620d79f
SHA1cdd59a6d1a1a4c474c19f1bacc289ca295179088
SHA2563c702a915ec35a6ce85b31316704a6bf55d6c782da0f96754bd04c21194f2767
SHA51250d7c16ac7a0cf5c0104e528771e8853d4c3190f1a8860c30a9c647fe5d0a2e5e9d3178a5b7993e67a7995088778c4e9a129cf35bed228cfebfde48efbe7490a
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02