Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe
Resource
win7-20220718-en
General
-
Target
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe
-
Size
1.8MB
-
MD5
ac23006ea8607c0a43f023bb29f4b4f4
-
SHA1
de98056c9d37c9e9696d2b057bef228577d47d93
-
SHA256
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab
-
SHA512
5d23729ac07aa39abe4ed990b03068dd2a68f0e6429001ec97eb150793625158acd5185c07df1ba6abc3ddbe68140179508b8e4b05043e3fd376897abf00dc19
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
ContentDeliveryManager.Utilities.module.exepid process 892 ContentDeliveryManager.Utilities.module.exe -
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1044 attrib.exe 1148 attrib.exe 1940 attrib.exe 1428 attrib.exe 1884 attrib.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe upx C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe upx \Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe upx behavioral1/memory/892-67-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
ContentDeliveryManager.Utilities.exepid process 1140 ContentDeliveryManager.Utilities.exe 1140 ContentDeliveryManager.Utilities.exe 1140 ContentDeliveryManager.Utilities.exe 1140 ContentDeliveryManager.Utilities.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipapi.co 5 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
ContentDeliveryManager.Utilities.exeContentDeliveryManager.Utilities.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ ContentDeliveryManager.Utilities.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ ContentDeliveryManager.Utilities.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exeContentDeliveryManager.Utilities.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\winmgmts:\localhost\ ContentDeliveryManager.Utilities.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ContentDeliveryManager.Utilities.exepid process 1140 ContentDeliveryManager.Utilities.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exepid process 896 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
ContentDeliveryManager.Utilities.module.exedescription pid process Token: SeRestorePrivilege 892 ContentDeliveryManager.Utilities.module.exe Token: 35 892 ContentDeliveryManager.Utilities.module.exe Token: SeSecurityPrivilege 892 ContentDeliveryManager.Utilities.module.exe Token: SeSecurityPrivilege 892 ContentDeliveryManager.Utilities.module.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exeContentDeliveryManager.Utilities.exetaskeng.exedescription pid process target process PID 896 wrote to memory of 1140 896 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe ContentDeliveryManager.Utilities.exe PID 896 wrote to memory of 1140 896 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe ContentDeliveryManager.Utilities.exe PID 896 wrote to memory of 1140 896 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe ContentDeliveryManager.Utilities.exe PID 896 wrote to memory of 1140 896 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe ContentDeliveryManager.Utilities.exe PID 1140 wrote to memory of 892 1140 ContentDeliveryManager.Utilities.exe ContentDeliveryManager.Utilities.module.exe PID 1140 wrote to memory of 892 1140 ContentDeliveryManager.Utilities.exe ContentDeliveryManager.Utilities.module.exe PID 1140 wrote to memory of 892 1140 ContentDeliveryManager.Utilities.exe ContentDeliveryManager.Utilities.module.exe PID 1140 wrote to memory of 892 1140 ContentDeliveryManager.Utilities.exe ContentDeliveryManager.Utilities.module.exe PID 1140 wrote to memory of 1044 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1044 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1044 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1044 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1148 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1148 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1148 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1148 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1940 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1940 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1940 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1940 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1428 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1428 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1428 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1428 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1884 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1884 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1884 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1140 wrote to memory of 1884 1140 ContentDeliveryManager.Utilities.exe attrib.exe PID 1908 wrote to memory of 1664 1908 taskeng.exe ContentDeliveryManager.Utilities.exe PID 1908 wrote to memory of 1664 1908 taskeng.exe ContentDeliveryManager.Utilities.exe PID 1908 wrote to memory of 1664 1908 taskeng.exe ContentDeliveryManager.Utilities.exe PID 1908 wrote to memory of 1664 1908 taskeng.exe ContentDeliveryManager.Utilities.exe PID 1908 wrote to memory of 936 1908 taskeng.exe ContentDeliveryManager.Utilities.exe PID 1908 wrote to memory of 936 1908 taskeng.exe ContentDeliveryManager.Utilities.exe PID 1908 wrote to memory of 936 1908 taskeng.exe ContentDeliveryManager.Utilities.exe PID 1908 wrote to memory of 936 1908 taskeng.exe ContentDeliveryManager.Utilities.exe -
Views/modifies file attributes 1 TTPs 5 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1884 attrib.exe 1044 attrib.exe 1148 attrib.exe 1940 attrib.exe 1428 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe"C:\Users\Admin\AppData\Local\Temp\b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ENU_687FE97ECA04C4CE9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1044
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1148
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1940
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1428
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1884
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CFBF9C8D-790F-44AC-9C9A-715B2056303A} S-1-5-21-4084403625-2215941253-1760665084-1000:LDLTPJLN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exe2⤵
- Drops file in System32 directory
PID:1664
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exe2⤵
- Drops file in System32 directory
PID:936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58d11707e19b246d0231a9575b0bca1ee
SHA19f56892d4b7ee60273ad21c2474be121e550f0a0
SHA25646036761b8882f5e627316be399fe63cfae5153d12e7fb32fd5d6d66d3fbd33c
SHA51291e535f2ee7a57fdff5ebda8f0164d58eb50af94b5bdbd96083f812cf9305073277f39fc8b286cd23005eef9270ba7ff6ec72a672d69fca79e22249025757be5
-
Filesize
49KB
MD57ac9e8829bcdab7f97a4865f8b93a7f9
SHA1c64180f68d7377423aee6a8eaccd2246743a0ad0
SHA2562d77bd1193836b5e72b40db19a01dedcd78739640a91ffd82af0800394e2342b
SHA5125e6271a7d2e99f9dbfbb43889964f36e092e64da469f8df1dfaa1f47192db69a8b187e795021f589c487ecc0fc8e55fc5f9c1a87723def6f744920abd542c149
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02