Analysis
-
max time kernel
158s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 16:28
Static task
static1
Behavioral task
behavioral1
Sample
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe
Resource
win7-20220901-en
General
-
Target
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe
-
Size
1.8MB
-
MD5
f91f2ecf8588064b9e29be6260ab34ba
-
SHA1
4d4b13685aae0765951466263dcc77df401cecc7
-
SHA256
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6
-
SHA512
012773b7ad4ade2cbc0f67cc63f94e7aeb59ae3e4849c0a7f7a0330b05e72e2d61f29428c4ff08c1fe01c2a1189a8a8b7f8f0b89d6746bee89dfe0662bead541
-
SSDEEP
49152:6h+ZkldoPK8YaybKfbYGrBhMTXfnFbDSZ:T2cPK8gbm4PFbDS
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll acprotect C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll acprotect -
Executes dropped EXE 1 IoCs
Processes:
odexl32.module.exepid process 2896 odexl32.module.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll upx C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.module.exe upx behavioral2/memory/2896-143-0x0000000000400000-0x000000000048E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
odexl32.exepid process 4344 odexl32.exe 4344 odexl32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 ipapi.co 25 ipapi.co 59 ipapi.co -
Drops file in System32 directory 2 IoCs
Processes:
odexl32.exeodexl32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ odexl32.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ odexl32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exeodexl32.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\winmgmts:\localhost\ odexl32.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 61 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exeodexl32.exeodexl32.exeodexl32.exepid process 5108 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe 5108 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe 4344 odexl32.exe 4344 odexl32.exe 4344 odexl32.exe 4344 odexl32.exe 4768 odexl32.exe 4768 odexl32.exe 3608 odexl32.exe 3608 odexl32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exepid process 5108 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
odexl32.module.exedescription pid process Token: SeRestorePrivilege 2896 odexl32.module.exe Token: 35 2896 odexl32.module.exe Token: SeSecurityPrivilege 2896 odexl32.module.exe Token: SeSecurityPrivilege 2896 odexl32.module.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exeodexl32.exedescription pid process target process PID 5108 wrote to memory of 4344 5108 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe odexl32.exe PID 5108 wrote to memory of 4344 5108 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe odexl32.exe PID 5108 wrote to memory of 4344 5108 c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe odexl32.exe PID 4344 wrote to memory of 2896 4344 odexl32.exe odexl32.module.exe PID 4344 wrote to memory of 2896 4344 odexl32.exe odexl32.module.exe PID 4344 wrote to memory of 2896 4344 odexl32.exe odexl32.module.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe"C:\Users\Admin\AppData\Local\Temp\c67cb51af4f82de8abd1ccae0594aaadbc5a0cf0200064f66ce6e2579c6a1ad6.exe"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exe2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\ENU_801FE97447113F3E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\1\*"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exe1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.exe1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fcebb94a0a39c563103f05b9e434039f
SHA117e9bfa4d4d8eb3a9e50f0a1ad491102198b95c3
SHA2563b3b3ae91ea27bba864c8a89f8884774ed28b98d6b7534ab3660c6c0944c102e
SHA51233932c53f79a5f9ba086dcd2e02c7a813aabf58371996455c28e9ad8d63ce69c3d73dc71eabab7b16d37d4f78dbe7f42ad2f990f37093317ecb26544fe7344a5
-
Filesize
53KB
MD5c9dfc0c4a264f1fdfb751010b9fd7642
SHA183e74b4daad04f00f70a02196a23bcafd322c5c3
SHA256abc994678a9a54f23d6c31678705602123576f7445b190ee41cff2469bafb88a
SHA512bcec2d37536aed04639436aee0cc93931464eaf76f5546543feb54c3359956f073b13d230a6a3d43ee82a690c034cea5c38b85168036a181176f8d90d978fc68
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\ENU_801FE97447113F3E9D41.7z
Filesize47KB
MD58a63c04bc6bdd651aefbdb85c179515a
SHA1bf3db85373d324e5a0bbc0b0a57cf68e879145b0
SHA2565d23e53d896a33d8e32c2eba0dc4822450a4ba11cf79f7914adee4e619cd32ce
SHA51297a8c4545943726e7f9522a682cd7628057260f9106f81532d5ad3293480584f9fd059c5a1e32e50f94474cdf28d613c26b7c83ee5bce85c3c11e61fea88ba9b
-
Filesize
218KB
MD59c5b4e4fcae7eb410f09c9e46ffb4a6d
SHA19d233bbe69676b1064f1deafba8e70a9acc00773
SHA2560376139308f3e83a73b76d3938d9c100779a83b98eeb3b3ebacfcbd1cc027fe9
SHA51259c35d730dc17e790aa4c89f82fd2f64b4d67405c2bdf21d4a9757fa8bfb64461f1247c9da482b310b117f1a24144bf6c612c9f7587577b7a286e2e3de724ee5
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-n..line-tool.resources\odexl32.sqlite3.module.dll
Filesize359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591