Analysis
-
max time kernel
125s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:20
Static task
static1
Behavioral task
behavioral1
Sample
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe
Resource
win7-20220812-en
General
-
Target
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe
-
Size
1.8MB
-
MD5
a3476e4532c77e8ee20ecabd1035d3fd
-
SHA1
15d58869b7ed04c16b3143ab1ee0e085056363bd
-
SHA256
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2
-
SHA512
7d64b2923bc4a501af7afe21cf7be36a4f947e18a753be7307982d65b221ee3de410f11d9a314b894d8de33b8031dec7feaf2e874e847187c1e7245c7849759b
-
SSDEEP
49152:Mh+ZkldoPK8Yadnm74l1QeWRCZuC4gOZtHN:d2cPK8r7XbWRCZhOZtH
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
dxtrans.module.exepid process 1676 dxtrans.module.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.module.exe upx \Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.module.exe upx C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.module.exe upx behavioral1/memory/1676-66-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/1676-69-0x0000000000400000-0x000000000047D000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
dxtrans.exepid process 1940 dxtrans.exe 1940 dxtrans.exe 1940 dxtrans.exe 1940 dxtrans.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ipapi.co 6 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
dxtrans.exedxtrans.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ dxtrans.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ dxtrans.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exedxtrans.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe File opened for modification C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\winmgmts:\localhost\ dxtrans.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dxtrans.exepid process 1940 dxtrans.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exepid process 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
dxtrans.module.exedescription pid process Token: SeRestorePrivilege 1676 dxtrans.module.exe Token: 35 1676 dxtrans.module.exe Token: SeSecurityPrivilege 1676 dxtrans.module.exe Token: SeSecurityPrivilege 1676 dxtrans.module.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exedxtrans.exetaskeng.exedescription pid process target process PID 1408 wrote to memory of 1940 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe dxtrans.exe PID 1408 wrote to memory of 1940 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe dxtrans.exe PID 1408 wrote to memory of 1940 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe dxtrans.exe PID 1408 wrote to memory of 1940 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe dxtrans.exe PID 1408 wrote to memory of 1940 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe dxtrans.exe PID 1408 wrote to memory of 1940 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe dxtrans.exe PID 1408 wrote to memory of 1940 1408 311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe dxtrans.exe PID 1940 wrote to memory of 1676 1940 dxtrans.exe dxtrans.module.exe PID 1940 wrote to memory of 1676 1940 dxtrans.exe dxtrans.module.exe PID 1940 wrote to memory of 1676 1940 dxtrans.exe dxtrans.module.exe PID 1940 wrote to memory of 1676 1940 dxtrans.exe dxtrans.module.exe PID 1940 wrote to memory of 1868 1940 dxtrans.exe attrib.exe PID 1940 wrote to memory of 1868 1940 dxtrans.exe attrib.exe PID 1940 wrote to memory of 1868 1940 dxtrans.exe attrib.exe PID 1940 wrote to memory of 1868 1940 dxtrans.exe attrib.exe PID 288 wrote to memory of 2008 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 2008 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 2008 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 2008 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 2008 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 2008 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 2008 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 1660 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 1660 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 1660 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 1660 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 1660 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 1660 288 taskeng.exe dxtrans.exe PID 288 wrote to memory of 1660 288 taskeng.exe dxtrans.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe"C:\Users\Admin\AppData\Local\Temp\311061da8395d212052ec8155b4571e5f4cd6c05d8c13acb52b8cd633efac8b2.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.module.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\ENU_687FE973ABB782FE9D41.7z" "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1868
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3E33FC62-0FDF-4F68-8503-781E18521753} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.exe2⤵
- Drops file in System32 directory
PID:2008
-
-
C:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.exeC:\Users\Admin\AppData\Roaming\wow64_microsoft-windows-smbserver-netapi\dxtrans.exe2⤵
- Drops file in System32 directory
PID:1660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5911546894290fe15a6b0ea4f366260b6
SHA1e2a06e9623a7586d003d0a77ab0d6e9d69c32a21
SHA25688aa4ab1734b2eb67015a402a60bc7b2b1fa7d4174ccc6563b148ac15eb8e18f
SHA512daef1065020bfa4ecbe846d849d3d89190eb35848d41e1368bc07947e02928b7cfc04d015996802d1a3d87679f163187b0ec9b8ffe8578a0b4e4524e2667101d
-
Filesize
51KB
MD572c8fd90f8fd6db81f0490663226c833
SHA1cac01250a6c4e45dffd191e5e415858ada627060
SHA256ed45038ff982a490c5caff01fdde4bd62922145cc635b7882727bf6f600b7b91
SHA512a11ff2cbed6651c8a01073c88e0c9da1869dea0d0eb43785395a7ab2672bffbaed0c6897ac34529d7b2fdeb3f2ce2a71a58e0aebceb98343db9094d24ba2e859
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02
-
Filesize
360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02