Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 16:28
Static task
static1
Behavioral task
behavioral1
Sample
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe
Resource
win7-20220901-en
General
-
Target
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe
-
Size
1.8MB
-
MD5
f91f2ecf8588064b9e29be6260ab34ba
-
SHA1
4d4b13685aae0765951466263dcc77df401cecc7
-
SHA256
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6
-
SHA512
012773b7ad4ade2cbc0f67cc63f94e7aeb59ae3e4849c0a7f7a0330b05e72e2d61f29428c4ff08c1fe01c2a1189a8a8b7f8f0b89d6746bee89dfe0662bead541
-
SSDEEP
49152:6h+ZkldoPK8YaybKfbYGrBhMTXfnFbDSZ:T2cPK8gbm4PFbDS
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll acprotect \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
odexl32.module.exepid process 1656 odexl32.module.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll upx \Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.module.exe upx behavioral1/memory/1656-66-0x0000000000400000-0x000000000048E000-memory.dmp upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.module.exe upx -
Loads dropped DLL 3 IoCs
Processes:
odexl32.exepid process 2036 odexl32.exe 2036 odexl32.exe 2036 odexl32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipapi.co 5 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
odexl32.exeodexl32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ odexl32.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ odexl32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exeodexl32.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\winmgmts:\localhost\ odexl32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exeodexl32.exeodexl32.exeodexl32.exepid process 1304 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe 2036 odexl32.exe 2036 odexl32.exe 1956 odexl32.exe 900 odexl32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exepid process 1304 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
odexl32.module.exedescription pid process Token: SeRestorePrivilege 1656 odexl32.module.exe Token: 35 1656 odexl32.module.exe Token: SeSecurityPrivilege 1656 odexl32.module.exe Token: SeSecurityPrivilege 1656 odexl32.module.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exeodexl32.exetaskeng.exedescription pid process target process PID 1304 wrote to memory of 2036 1304 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe odexl32.exe PID 1304 wrote to memory of 2036 1304 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe odexl32.exe PID 1304 wrote to memory of 2036 1304 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe odexl32.exe PID 1304 wrote to memory of 2036 1304 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe odexl32.exe PID 2036 wrote to memory of 1656 2036 odexl32.exe odexl32.module.exe PID 2036 wrote to memory of 1656 2036 odexl32.exe odexl32.module.exe PID 2036 wrote to memory of 1656 2036 odexl32.exe odexl32.module.exe PID 2036 wrote to memory of 1656 2036 odexl32.exe odexl32.module.exe PID 1988 wrote to memory of 1956 1988 taskeng.exe odexl32.exe PID 1988 wrote to memory of 1956 1988 taskeng.exe odexl32.exe PID 1988 wrote to memory of 1956 1988 taskeng.exe odexl32.exe PID 1988 wrote to memory of 1956 1988 taskeng.exe odexl32.exe PID 1988 wrote to memory of 900 1988 taskeng.exe odexl32.exe PID 1988 wrote to memory of 900 1988 taskeng.exe odexl32.exe PID 1988 wrote to memory of 900 1988 taskeng.exe odexl32.exe PID 1988 wrote to memory of 900 1988 taskeng.exe odexl32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe"C:\Users\Admin\AppData\Local\Temp\c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\ENU_687FE975163BE92E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {578F13C7-B993-417F-9356-F9BA17FDEB75} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exe2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exe2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a28a8b512fa4aed87debc6de13ebeaa5
SHA1f12be137cd54940bc514d36734cfbe2d036d3286
SHA256022402fd7129201d04b5bdb0cba3cdb1c4a6db318e132348a562903bb9cd2790
SHA51296b44cdc765f0e43d93c8af5e0bce8d659296e21510588b26ef3d578885280733543054dd3c123d10a034f67fc5a63f72a1f4dbac7bb412a8d396c258e175001
-
Filesize
46KB
MD506e9e79e83f75903a732e4bf8194512d
SHA1121f72b924b8157d38ac2893e9fd41ff0729f49f
SHA256c7e0bf15dd3b768880646f1fceb2d20ca50b6891bc495230af965ea48f003d42
SHA512f5b094823236ee7084f23af66bbe85bc80e38d02e58fdde47b3a8c520ac3829e5cf31ab3e8193684770134a094193df99366b182c9201bcf36f42b93f3dd6bc6
-
Filesize
218KB
MD59c5b4e4fcae7eb410f09c9e46ffb4a6d
SHA19d233bbe69676b1064f1deafba8e70a9acc00773
SHA2560376139308f3e83a73b76d3938d9c100779a83b98eeb3b3ebacfcbd1cc027fe9
SHA51259c35d730dc17e790aa4c89f82fd2f64b4d67405c2bdf21d4a9757fa8bfb64461f1247c9da482b310b117f1a24144bf6c612c9f7587577b7a286e2e3de724ee5
-
Filesize
218KB
MD59c5b4e4fcae7eb410f09c9e46ffb4a6d
SHA19d233bbe69676b1064f1deafba8e70a9acc00773
SHA2560376139308f3e83a73b76d3938d9c100779a83b98eeb3b3ebacfcbd1cc027fe9
SHA51259c35d730dc17e790aa4c89f82fd2f64b4d67405c2bdf21d4a9757fa8bfb64461f1247c9da482b310b117f1a24144bf6c612c9f7587577b7a286e2e3de724ee5
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591
-
\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591