Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 03:10
Static task
static1
Behavioral task
behavioral1
Sample
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe
Resource
win7-20220715-en
General
-
Target
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe
-
Size
2.6MB
-
MD5
d9af38a14e01a4d4e273f79ebf0a4ab9
-
SHA1
8df4995a819f1784c02322b9e751aad23f7983f0
-
SHA256
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52
-
SHA512
9abe97764728bf5dd15b63639954f235e92077876a709b47329b77156df40c93ef510fbcf9a43bcc82da01425137241929ade5126f515a4aa34aca87ca7eaa50
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
KBDLT.module.exepid process 772 KBDLT.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.sqlite3.module.dll upx behavioral2/memory/4384-153-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.module.exe upx C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.module.exe upx behavioral2/memory/772-159-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/772-160-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
KBDLT.exepid process 4384 KBDLT.exe 4384 KBDLT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ipapi.co 15 ipapi.co -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4772-133-0x0000000000DA0000-0x0000000000F72000-memory.dmp autoit_exe behavioral2/memory/4772-140-0x0000000000DA0000-0x0000000000F72000-memory.dmp autoit_exe behavioral2/memory/4384-143-0x0000000000800000-0x00000000009D2000-memory.dmp autoit_exe behavioral2/memory/4384-150-0x0000000000800000-0x00000000009D2000-memory.dmp autoit_exe behavioral2/memory/4896-170-0x0000000000DA0000-0x0000000000F72000-memory.dmp autoit_exe behavioral2/memory/2292-179-0x0000000000800000-0x00000000009D2000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
KBDLT.exeKBDLT.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ KBDLT.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ KBDLT.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exeKBDLT.exeKBDLT.exeKBDLT.exedescription pid process target process PID 2252 set thread context of 4772 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe PID 3516 set thread context of 4384 3516 KBDLT.exe KBDLT.exe PID 4532 set thread context of 4896 4532 KBDLT.exe KBDLT.exe PID 4292 set thread context of 2292 4292 KBDLT.exe KBDLT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exeKBDLT.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\winmgmts:\localhost\ KBDLT.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
KBDLT.exepid process 4384 KBDLT.exe 4384 KBDLT.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exepid process 4772 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
KBDLT.module.exedescription pid process Token: SeRestorePrivilege 772 KBDLT.module.exe Token: 35 772 KBDLT.module.exe Token: SeSecurityPrivilege 772 KBDLT.module.exe Token: SeSecurityPrivilege 772 KBDLT.module.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exeKBDLT.exeKBDLT.exeKBDLT.exepid process 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 3516 KBDLT.exe 3516 KBDLT.exe 3516 KBDLT.exe 4532 KBDLT.exe 4532 KBDLT.exe 4532 KBDLT.exe 4292 KBDLT.exe 4292 KBDLT.exe 4292 KBDLT.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exeKBDLT.exeKBDLT.exeKBDLT.exepid process 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 3516 KBDLT.exe 3516 KBDLT.exe 3516 KBDLT.exe 4532 KBDLT.exe 4532 KBDLT.exe 4532 KBDLT.exe 4292 KBDLT.exe 4292 KBDLT.exe 4292 KBDLT.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exeKBDLT.exeKBDLT.exeKBDLT.exeKBDLT.exedescription pid process target process PID 2252 wrote to memory of 4772 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe PID 2252 wrote to memory of 4772 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe PID 2252 wrote to memory of 4772 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe PID 2252 wrote to memory of 4772 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe PID 2252 wrote to memory of 4772 2252 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe PID 4772 wrote to memory of 3516 4772 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe KBDLT.exe PID 4772 wrote to memory of 3516 4772 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe KBDLT.exe PID 4772 wrote to memory of 3516 4772 8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe KBDLT.exe PID 3516 wrote to memory of 4384 3516 KBDLT.exe KBDLT.exe PID 3516 wrote to memory of 4384 3516 KBDLT.exe KBDLT.exe PID 3516 wrote to memory of 4384 3516 KBDLT.exe KBDLT.exe PID 3516 wrote to memory of 4384 3516 KBDLT.exe KBDLT.exe PID 3516 wrote to memory of 4384 3516 KBDLT.exe KBDLT.exe PID 4384 wrote to memory of 772 4384 KBDLT.exe KBDLT.module.exe PID 4384 wrote to memory of 772 4384 KBDLT.exe KBDLT.module.exe PID 4384 wrote to memory of 772 4384 KBDLT.exe KBDLT.module.exe PID 4384 wrote to memory of 2688 4384 KBDLT.exe attrib.exe PID 4384 wrote to memory of 2688 4384 KBDLT.exe attrib.exe PID 4384 wrote to memory of 2688 4384 KBDLT.exe attrib.exe PID 4532 wrote to memory of 4896 4532 KBDLT.exe KBDLT.exe PID 4532 wrote to memory of 4896 4532 KBDLT.exe KBDLT.exe PID 4532 wrote to memory of 4896 4532 KBDLT.exe KBDLT.exe PID 4532 wrote to memory of 4896 4532 KBDLT.exe KBDLT.exe PID 4532 wrote to memory of 4896 4532 KBDLT.exe KBDLT.exe PID 4292 wrote to memory of 2292 4292 KBDLT.exe KBDLT.exe PID 4292 wrote to memory of 2292 4292 KBDLT.exe KBDLT.exe PID 4292 wrote to memory of 2292 4292 KBDLT.exe KBDLT.exe PID 4292 wrote to memory of 2292 4292 KBDLT.exe KBDLT.exe PID 4292 wrote to memory of 2292 4292 KBDLT.exe KBDLT.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"C:\Users\Admin\AppData\Local\Temp\8194c457a69ef4756b0b36675901799430d58a70c397d7209b48a0eb0ea32a52.exe"2⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"4⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\ENU_801FE9714A7A301E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\1\*"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana"5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2688
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"2⤵
- Drops file in System32 directory
PID:4896
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.exe"2⤵
- Drops file in System32 directory
PID:2292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bf95cc86bb9a3968acb7f3c556c0a98e
SHA1af89b43578fcb32544280573f808c429605d308b
SHA256979a4a54b293bad7dc4c1841ab4a9c1f7580764efb7e1fb89866abb2c6a9585a
SHA512f32694c90af899c176632250a443e08259ac1c36e76be9b62a4350a131e3aa218d12025b69766d76d7205451b4afcdc4af7799afe35574448bcc0fd5659762cb
-
Filesize
48KB
MD562d94d2b5e9d10e27c71fb958db3fef9
SHA1d25fa9ae21d1a74d78bb312fa2dd7c93a90a09db
SHA256294c699caa667f55f707327b815cb5a46db2b6f32c4595fac939567ae2b31a5f
SHA512a3f218db3e0eb7bbd48fade1e5538c5fa384654b795b0c3a3c1f56000c6ecef15eb256ce1a926ed2b4ed78e3348808518249bb53a193b7ff14c765cf6127be93
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-font-truetype-verdana\KBDLT.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02