Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 03:10
Static task
static1
Behavioral task
behavioral1
Sample
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe
Resource
win7-20220715-en
General
-
Target
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe
-
Size
2.6MB
-
MD5
d9af38a14e01a4d4e273f79ebf0a4ab9
-
SHA1
8df4995a819f1784c02322b9e751aad23f7983f0
-
SHA256
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52
-
SHA512
9abe97764728bf5dd15b63639954f235e92077876a709b47329b77156df40c93ef510fbcf9a43bcc82da01425137241929ade5126f515a4aa34aca87ca7eaa50
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000012741-81.dat acprotect behavioral1/files/0x0008000000012741-82.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1696 KBDLT.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 944 attrib.exe -
resource yara_rule behavioral1/files/0x0008000000012741-81.dat upx behavioral1/files/0x0008000000012741-82.dat upx behavioral1/memory/1996-83-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/1996-84-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/files/0x00090000000133bd-85.dat upx behavioral1/files/0x00090000000133bd-86.dat upx behavioral1/files/0x00090000000133bd-88.dat upx behavioral1/memory/1696-91-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/1996-95-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1996 KBDLT.exe 1996 KBDLT.exe 1996 KBDLT.exe 1996 KBDLT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipapi.co 5 ipapi.co -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1884-57-0x00000000007B0000-0x0000000000982000-memory.dmp autoit_exe behavioral1/memory/1884-64-0x00000000007D800A-mapping.dmp autoit_exe behavioral1/memory/1884-66-0x00000000007B0000-0x0000000000982000-memory.dmp autoit_exe behavioral1/memory/1996-71-0x0000000000710000-0x00000000008E2000-memory.dmp autoit_exe behavioral1/memory/1996-78-0x000000000073800A-mapping.dmp autoit_exe behavioral1/memory/1996-80-0x0000000000710000-0x00000000008E2000-memory.dmp autoit_exe behavioral1/memory/592-100-0x00000000007F0000-0x00000000009C2000-memory.dmp autoit_exe behavioral1/memory/592-107-0x000000000081800A-mapping.dmp autoit_exe behavioral1/memory/592-109-0x00000000007F0000-0x00000000009C2000-memory.dmp autoit_exe behavioral1/memory/1304-114-0x0000000000610000-0x00000000007E2000-memory.dmp autoit_exe behavioral1/memory/1304-123-0x0000000000610000-0x00000000007E2000-memory.dmp autoit_exe behavioral1/memory/1304-121-0x000000000063800A-mapping.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ KBDLT.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ KBDLT.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1808 set thread context of 1884 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 26 PID 1276 set thread context of 1996 1276 KBDLT.exe 28 PID 1840 set thread context of 592 1840 KBDLT.exe 38 PID 1808 set thread context of 1304 1808 KBDLT.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\winmgmts:\localhost\ KBDLT.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1996 KBDLT.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1884 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1696 KBDLT.module.exe Token: 35 1696 KBDLT.module.exe Token: SeSecurityPrivilege 1696 KBDLT.module.exe Token: SeSecurityPrivilege 1696 KBDLT.module.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 1276 KBDLT.exe 1276 KBDLT.exe 1276 KBDLT.exe 1840 KBDLT.exe 1840 KBDLT.exe 1840 KBDLT.exe 1808 KBDLT.exe 1808 KBDLT.exe 1808 KBDLT.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 1276 KBDLT.exe 1276 KBDLT.exe 1276 KBDLT.exe 1840 KBDLT.exe 1840 KBDLT.exe 1840 KBDLT.exe 1808 KBDLT.exe 1808 KBDLT.exe 1808 KBDLT.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1884 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 26 PID 1808 wrote to memory of 1884 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 26 PID 1808 wrote to memory of 1884 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 26 PID 1808 wrote to memory of 1884 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 26 PID 1808 wrote to memory of 1884 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 26 PID 1808 wrote to memory of 1884 1808 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 26 PID 1884 wrote to memory of 1276 1884 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 27 PID 1884 wrote to memory of 1276 1884 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 27 PID 1884 wrote to memory of 1276 1884 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 27 PID 1884 wrote to memory of 1276 1884 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 27 PID 1276 wrote to memory of 1996 1276 KBDLT.exe 28 PID 1276 wrote to memory of 1996 1276 KBDLT.exe 28 PID 1276 wrote to memory of 1996 1276 KBDLT.exe 28 PID 1276 wrote to memory of 1996 1276 KBDLT.exe 28 PID 1276 wrote to memory of 1996 1276 KBDLT.exe 28 PID 1276 wrote to memory of 1996 1276 KBDLT.exe 28 PID 1996 wrote to memory of 1696 1996 KBDLT.exe 32 PID 1996 wrote to memory of 1696 1996 KBDLT.exe 32 PID 1996 wrote to memory of 1696 1996 KBDLT.exe 32 PID 1996 wrote to memory of 1696 1996 KBDLT.exe 32 PID 1996 wrote to memory of 944 1996 KBDLT.exe 34 PID 1996 wrote to memory of 944 1996 KBDLT.exe 34 PID 1996 wrote to memory of 944 1996 KBDLT.exe 34 PID 1996 wrote to memory of 944 1996 KBDLT.exe 34 PID 1312 wrote to memory of 1840 1312 taskeng.exe 37 PID 1312 wrote to memory of 1840 1312 taskeng.exe 37 PID 1312 wrote to memory of 1840 1312 taskeng.exe 37 PID 1312 wrote to memory of 1840 1312 taskeng.exe 37 PID 1840 wrote to memory of 592 1840 KBDLT.exe 38 PID 1840 wrote to memory of 592 1840 KBDLT.exe 38 PID 1840 wrote to memory of 592 1840 KBDLT.exe 38 PID 1840 wrote to memory of 592 1840 KBDLT.exe 38 PID 1840 wrote to memory of 592 1840 KBDLT.exe 38 PID 1840 wrote to memory of 592 1840 KBDLT.exe 38 PID 1312 wrote to memory of 1808 1312 taskeng.exe 39 PID 1312 wrote to memory of 1808 1312 taskeng.exe 39 PID 1312 wrote to memory of 1808 1312 taskeng.exe 39 PID 1312 wrote to memory of 1808 1312 taskeng.exe 39 PID 1808 wrote to memory of 1304 1808 KBDLT.exe 40 PID 1808 wrote to memory of 1304 1808 KBDLT.exe 40 PID 1808 wrote to memory of 1304 1808 KBDLT.exe 40 PID 1808 wrote to memory of 1304 1808 KBDLT.exe 40 PID 1808 wrote to memory of 1304 1808 KBDLT.exe 40 PID 1808 wrote to memory of 1304 1808 KBDLT.exe 40 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 944 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"2⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"4⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\ENU_687FE97997C0942E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:944
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FBB96371-F52D-4EE3-9B6E-EDF5341BB89A} S-1-5-21-335065374-4263250628-1829373619-1000:RTYPLWYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"3⤵
- Drops file in System32 directory
PID:592
-
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"3⤵
- Drops file in System32 directory
PID:1304
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59755355711326078a0db4198bb4bd586
SHA1fbace628adcb185e99326356e12ebf189f448855
SHA256cfea1b8c39ab758a99b7cc58ce372f101017b05bc753e7758f94e06228b96e20
SHA512d13d222141c3bfbc879de53a48bac2b0f931b2bbabbd71952a2d90386855b48bd322f3eb5ec03e137a162c340c39499a178a55aea6cef6f3b8ee75f2ea83cd9b
-
Filesize
48KB
MD535781ec2ddc5ef85771937fb7e8a3b85
SHA1e8c1c8eaac1e2f2513e792483ca3c9ec78752ccf
SHA2565dd58c0038f64fd8127d637febbed179fc1d2c1edc9fc84e0b3dd2283e16860a
SHA51254c6e342b50a70ba97013c105a3e79b435de0be29e4023bac01c951bef4627c73b8d796adbc88460b30a835f785d60223cc08a3e5f00af77ee020dfc65b625f9
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02