Analysis
-
max time kernel
165s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 03:56
Static task
static1
Behavioral task
behavioral1
Sample
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe
Resource
win7-20220715-en
General
-
Target
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe
-
Size
3.2MB
-
MD5
36cec5d837f6c92e84a1f3e3e684c75d
-
SHA1
25b9335f00f4c5df73b15075d80caacd7c1a61f4
-
SHA256
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166
-
SHA512
d4a1ffcd1dc5583cc968056c64480733652d7d2de7cb5c85788ddc92c78b486b5d7019ec5ddb90d309c80d74f234f0d1bd9b0cf9a9531c86abaa9a130360aa26
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll acprotect -
Executes dropped EXE 6 IoCs
Processes:
Build.exeGH Inject.exeMP3DMOD.exeMP3DMOD.module.exeMP3DMOD.exeMP3DMOD.exepid process 4020 Build.exe 1896 GH Inject.exe 2836 MP3DMOD.exe 2320 MP3DMOD.module.exe 896 MP3DMOD.exe 2316 MP3DMOD.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe upx C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe upx behavioral2/memory/1896-136-0x00007FF6F2AC0000-0x00007FF6F2CAE000-memory.dmp upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll upx behavioral2/memory/2836-141-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral2/memory/1896-142-0x00007FF6F2AC0000-0x00007FF6F2CAE000-memory.dmp upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exe upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exe upx behavioral2/memory/2320-148-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe -
Loads dropped DLL 2 IoCs
Processes:
MP3DMOD.exepid process 2836 MP3DMOD.exe 2836 MP3DMOD.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 ipapi.co 37 ipapi.co 22 ipapi.co -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe autoit_exe behavioral2/memory/1896-136-0x00007FF6F2AC0000-0x00007FF6F2CAE000-memory.dmp autoit_exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe autoit_exe behavioral2/memory/1896-142-0x00007FF6F2AC0000-0x00007FF6F2CAE000-memory.dmp autoit_exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe autoit_exe C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe autoit_exe -
Drops file in System32 directory 2 IoCs
Processes:
MP3DMOD.exeMP3DMOD.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ MP3DMOD.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ MP3DMOD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
Build.exeMP3DMOD.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ Build.exe File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\winmgmts:\localhost\ MP3DMOD.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MP3DMOD.exepid process 2836 MP3DMOD.exe 2836 MP3DMOD.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
MP3DMOD.module.exedescription pid process Token: SeRestorePrivilege 2320 MP3DMOD.module.exe Token: 35 2320 MP3DMOD.module.exe Token: SeSecurityPrivilege 2320 MP3DMOD.module.exe Token: SeSecurityPrivilege 2320 MP3DMOD.module.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
GH Inject.exepid process 1896 GH Inject.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exeBuild.exeMP3DMOD.exedescription pid process target process PID 1616 wrote to memory of 4020 1616 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe Build.exe PID 1616 wrote to memory of 4020 1616 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe Build.exe PID 1616 wrote to memory of 4020 1616 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe Build.exe PID 1616 wrote to memory of 1896 1616 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe GH Inject.exe PID 1616 wrote to memory of 1896 1616 4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe GH Inject.exe PID 4020 wrote to memory of 2836 4020 Build.exe MP3DMOD.exe PID 4020 wrote to memory of 2836 4020 Build.exe MP3DMOD.exe PID 4020 wrote to memory of 2836 4020 Build.exe MP3DMOD.exe PID 2836 wrote to memory of 2320 2836 MP3DMOD.exe MP3DMOD.module.exe PID 2836 wrote to memory of 2320 2836 MP3DMOD.exe MP3DMOD.module.exe PID 2836 wrote to memory of 2320 2836 MP3DMOD.exe MP3DMOD.module.exe PID 2836 wrote to memory of 4812 2836 MP3DMOD.exe attrib.exe PID 2836 wrote to memory of 4812 2836 MP3DMOD.exe attrib.exe PID 2836 wrote to memory of 4812 2836 MP3DMOD.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe"C:\Users\Admin\AppData\Local\Temp\4c91a53768ca9333752d0c9600d8f1c2e925efd4fa5e884c9aa939f973f8d166.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe"C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\Build.exe"2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\ENU_801FE9785E7BA11E9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\1\*"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources"4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4812
-
-
-
-
C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe"C:\Users\Admin\AppData\Roaming\zkGmqIWWfHbnbQQ\GH Inject.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:896
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51d7a0320835b8bda482865432e0b6c4d
SHA1b3f9ca1c8aeea472abc53bd15ddcfb8db6f53a63
SHA2565592dab948159db01c4aca7c0d9d8a59aa2ea7877ca75f947605b24fbd12459d
SHA5125f8a958364e4a16847406ebe2f95a0331acef779e77461373a5275717acf723abbbece94192741c8c255f403928f088900af689e4106c1d88476b227f0c71cd3
-
Filesize
50KB
MD5ef0a80493bd2ffaf719001ce7856ceec
SHA1d5114e8ef7a3f6c5b348c1b4bb926d5c5cc6c98a
SHA25638107af5aeb25b974d056fbb54745a1c94d4d96c3d50166acc1f94cf8ddf5fca
SHA5120fc875299e0676faf2d398101126f8a55eb4bee516f81d766deaa78325a09464557cda8a12ad7506e7faac84d235e351ea51d8a7ea1982b3c21e347dc6d4114c
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-a..apc-layer.resources\MP3DMOD.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
1.8MB
MD52d3271bf27d0b16d36ae52c52a6fecc5
SHA1b81c84bea56690dabe6344ac073528fafdaa8628
SHA2560d198296d0d1e20baaa3d93a18d7b11057cd1ed8a9612bac414d79b5f749792f
SHA512dcd636b07a973ac2f91d190cc1baa793240d1832cc288aa6e39c421449612966d679cf19a74fe341246129d4b91732df8f6a3429a89739bf59009aa25f0d713b
-
Filesize
880KB
MD54c5663d6ec18f7d05fe4ecb100c020aa
SHA1193c6eccd581e89ea2d85daccb356059e340e89a
SHA256d99c2d6662e6db724442451c5e83de94a2fb0cd624bb26654e9ef8e3e9df38f6
SHA512ec938a227aee3bfb92edcc6c20a35faa8f5a04efa25b65dec67b58606e6c199357a6eefe4e9a131e0adea52e612ac537ccb42a664abe8c9ada8108f7e717130a
-
Filesize
880KB
MD54c5663d6ec18f7d05fe4ecb100c020aa
SHA1193c6eccd581e89ea2d85daccb356059e340e89a
SHA256d99c2d6662e6db724442451c5e83de94a2fb0cd624bb26654e9ef8e3e9df38f6
SHA512ec938a227aee3bfb92edcc6c20a35faa8f5a04efa25b65dec67b58606e6c199357a6eefe4e9a131e0adea52e612ac537ccb42a664abe8c9ada8108f7e717130a