Analysis
-
max time kernel
124s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe
Resource
win7-20220718-en
General
-
Target
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe
-
Size
1.8MB
-
MD5
ac23006ea8607c0a43f023bb29f4b4f4
-
SHA1
de98056c9d37c9e9696d2b057bef228577d47d93
-
SHA256
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab
-
SHA512
5d23729ac07aa39abe4ed990b03068dd2a68f0e6429001ec97eb150793625158acd5185c07df1ba6abc3ddbe68140179508b8e4b05043e3fd376897abf00dc19
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
ContentDeliveryManager.Utilities.module.exepid process 2792 ContentDeliveryManager.Utilities.module.exe -
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2836 attrib.exe 4064 attrib.exe 1688 attrib.exe 3508 attrib.exe 1808 attrib.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll upx behavioral2/memory/2296-132-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll upx behavioral2/memory/2296-135-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe upx C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe upx behavioral2/memory/2792-142-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
ContentDeliveryManager.Utilities.exepid process 2296 ContentDeliveryManager.Utilities.exe 2296 ContentDeliveryManager.Utilities.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ipapi.co 13 ipapi.co 19 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
ContentDeliveryManager.Utilities.exeContentDeliveryManager.Utilities.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ ContentDeliveryManager.Utilities.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ ContentDeliveryManager.Utilities.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
ContentDeliveryManager.Utilities.exeb6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\winmgmts:\localhost\ ContentDeliveryManager.Utilities.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ContentDeliveryManager.Utilities.exepid process 2296 ContentDeliveryManager.Utilities.exe 2296 ContentDeliveryManager.Utilities.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exepid process 1876 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
ContentDeliveryManager.Utilities.module.exedescription pid process Token: SeRestorePrivilege 2792 ContentDeliveryManager.Utilities.module.exe Token: 35 2792 ContentDeliveryManager.Utilities.module.exe Token: SeSecurityPrivilege 2792 ContentDeliveryManager.Utilities.module.exe Token: SeSecurityPrivilege 2792 ContentDeliveryManager.Utilities.module.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exeContentDeliveryManager.Utilities.exedescription pid process target process PID 1876 wrote to memory of 2296 1876 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe ContentDeliveryManager.Utilities.exe PID 1876 wrote to memory of 2296 1876 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe ContentDeliveryManager.Utilities.exe PID 1876 wrote to memory of 2296 1876 b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe ContentDeliveryManager.Utilities.exe PID 2296 wrote to memory of 2792 2296 ContentDeliveryManager.Utilities.exe ContentDeliveryManager.Utilities.module.exe PID 2296 wrote to memory of 2792 2296 ContentDeliveryManager.Utilities.exe ContentDeliveryManager.Utilities.module.exe PID 2296 wrote to memory of 2792 2296 ContentDeliveryManager.Utilities.exe ContentDeliveryManager.Utilities.module.exe PID 2296 wrote to memory of 1808 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 1808 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 1808 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 2836 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 2836 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 2836 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 4064 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 4064 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 4064 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 1688 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 1688 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 1688 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 3508 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 3508 2296 ContentDeliveryManager.Utilities.exe attrib.exe PID 2296 wrote to memory of 3508 2296 ContentDeliveryManager.Utilities.exe attrib.exe -
Views/modifies file attributes 1 TTPs 5 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2836 attrib.exe 4064 attrib.exe 1688 attrib.exe 3508 attrib.exe 1808 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe"C:\Users\Admin\AppData\Local\Temp\b6618dc084f82d1a1dacc281ee4b33adb88545d2540dc8753840b5f7564a45ab.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ENU_801FE97682E4151E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1808
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2836
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4064
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1688
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3508
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exe1⤵
- Drops file in System32 directory
PID:2040
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exeC:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.exe1⤵
- Drops file in System32 directory
PID:1148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5077864f191bad3d130f37f29cf0c8f8a
SHA1453022ebe8e92cf63263ce269c63f821e14ab422
SHA256e15234a4e24045de1ab2bbf3a6c765eda7f1f35b3d5f4cb4f5b35b73c67e1e6f
SHA5127681e951854bea963802cf822740fab786658b149b19aa4d56ac4158e9b8f78e46b428fd4309725278a1d9eacbc966bfd343f59bef79d6a0ae8ced7a8b0dea64
-
Filesize
50KB
MD59a2f3f56f3644f174ce8333b611b8239
SHA16f57ea3a62401a523c3df752037622286a9d698f
SHA2568e1b7c704ee804066fffc6de58f9bf7c53bebbd26fdd1e12b97f380595c237e3
SHA51243975a65348f1d8d500ff4583240695bc22c00e90940d90bbb867ca22208d3839c19be911cc7cb75f328cb36188a025cb28e12ff72db50f433be7cb577800b97
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.module.exe
Filesize197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
C:\Users\Admin\AppData\Roaming\x86_microsoft.windows.c..-controls.resources\ContentDeliveryManager.Utilities.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02