Malware Analysis Report

2024-09-23 04:45

Sample ID 231219-rd28xabfdm
Target 3d9ae690ce0efb6453b8417a1f2c3fd7
SHA256 2e46b4136c5556e634f1ceec894c9618198d36711f0bb45cf2aee4d1b54b0b10
Tags
qulab discovery evasion ransomware spyware stealer upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2e46b4136c5556e634f1ceec894c9618198d36711f0bb45cf2aee4d1b54b0b10

Threat Level: Known bad

The file 3d9ae690ce0efb6453b8417a1f2c3fd7 was found to be: Known bad.

Malicious Activity Summary

qulab discovery evasion ransomware spyware stealer upx

Qulab Stealer & Clipper

Sets file to hidden

UPX packed file

ACProtect 1.3x - 1.4x DLL software

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Checks installed software on the system

Looks up external IP address via web service

Accesses cryptocurrency files/wallets, possible credential harvesting

Drops file in System32 directory

AutoIT Executable

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Views/modifies file attributes

Modifies system certificate store

NTFS ADS

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: RenamesItself

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2023-12-19 14:05

Signatures

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-19 14:05

Reported

2023-12-19 17:14

Platform

win10v2004-20231215-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-19 14:05

Reported

2023-12-19 17:19

Platform

win7-20231129-en

Max time kernel

130s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe"

Signatures

Qulab Stealer & Clipper

stealer qulab

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Looks up external IP address via web service

Description Indicator Process Target
N/A ipapi.co N/A N/A
N/A ipapi.co N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe N/A
File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe N/A

Enumerates physical storage devices

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\winmgmts:\localhost\ C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2656 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2656 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2656 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2656 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2356 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe
PID 2356 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe
PID 2356 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe
PID 2356 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe
PID 2420 wrote to memory of 544 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2420 wrote to memory of 544 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2420 wrote to memory of 544 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2420 wrote to memory of 544 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2420 wrote to memory of 996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2420 wrote to memory of 996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2420 wrote to memory of 996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2420 wrote to memory of 996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe
PID 2356 wrote to memory of 1648 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Windows\SysWOW64\attrib.exe
PID 2356 wrote to memory of 1648 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Windows\SysWOW64\attrib.exe
PID 2356 wrote to memory of 1648 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Windows\SysWOW64\attrib.exe
PID 2356 wrote to memory of 1648 N/A C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe C:\Windows\SysWOW64\attrib.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe

"C:\Users\Admin\AppData\Local\Temp\3d9ae690ce0efb6453b8417a1f2c3fd7.exe"

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\ENU_687FE9771A274C7E9D41.7z" "C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\1\*"

C:\Windows\system32\taskeng.exe

taskeng.exe {DC4C7068-9E96-48B7-BFD1-48519C7352EA} S-1-5-21-3470981204-343661084-3367201002-1000:GLTGRJAG\Admin:Interactive:[1]

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.exe

C:\Windows\SysWOW64\attrib.exe

attrib +s +h "C:\Users\Admin\AppData\Roaming\msil_napsnap.resources"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
NL 149.154.167.220:443 api.telegram.org tcp
NL 149.154.167.220:443 api.telegram.org tcp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 ipapi.co udp
US 172.67.69.226:443 ipapi.co tcp
US 8.8.8.8:53 www.microsoft.com udp
RU 89.191.233.38:65233 tcp
RU 89.191.233.38:65233 tcp
RU 89.191.233.38:65233 tcp
RU 89.191.233.38:65233 tcp
RU 89.191.233.38:65233 tcp
RU 89.191.233.38:65233 tcp

Files

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.sqlite3.module.dll.7

MD5 f2613cc54e47166dc40f6b26f74f72f3
SHA1 63f7a6117c80f67697805bcf75c9fb003411039f
SHA256 4cb37237ac6ee8150c83a179858e13abfd619416a62b69acf3bf4e28fd7055bb
SHA512 ffd714f97f2e39da4a391c99fed72fe8e14b59872e15059ac9874a92c2d2cc3860c0ae2f2c108a3cee39c59d51a817882d0fda8ef6f7d1413ced26da5be99fef

\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.sqlite3.module.dll

MD5 8c127ce55bfbb55eb9a843c693c9f240
SHA1 75c462c935a7ff2c90030c684440d61d48bb1858
SHA256 4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512 d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

memory/2356-12-0x0000000061E00000-0x0000000061ED2000-memory.dmp

memory/2356-15-0x0000000061E00000-0x0000000061ED2000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\Local\Temp\Tar1184.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe.7

MD5 bde3266064c287f3acbbd36e2f397d1c
SHA1 001f15df928bf9e0d74ae0263b131cda35470d8b
SHA256 59e188fcb29afeaef50adecc9473b8a1dc9b25743e14e0911fef2e9c1e62db76
SHA512 ba0f1c6b5e52c0b0ff7c0bf8637fca16a6f591e0d0807c50aaf904e95788fc6eec169554f1a8cf47a09bb18b8f94b34c2f8cd67d7bfdc7300180f54c79a62d75

\Users\Admin\AppData\Roaming\msil_napsnap.resources\SSShim.module.exe

MD5 946285055913d457fda78a4484266e96
SHA1 668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA256 23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA512 30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

memory/2356-86-0x0000000002A30000-0x0000000002AAD000-memory.dmp

memory/2356-85-0x0000000002A30000-0x0000000002AAD000-memory.dmp

memory/2796-87-0x0000000000400000-0x000000000047D000-memory.dmp

memory/2796-91-0x0000000000400000-0x000000000047D000-memory.dmp

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\1\Screen.jpg

MD5 00d08b877382588a84b0f985f299b718
SHA1 3c2cbf9dbf16e228d5aff06172c7ac56bfbf267c
SHA256 f61e08cad2a2c3f9bf9e6ed57c33f72cccf449465cb6f52b5c7bae48f931e7b1
SHA512 db69f301ba8f503009b1f26ff82299d9422bf681e7cf5676e71e02e18a90b3e7484bda5900e6401531c0153e996279d3b4602693ad32b4801760b3ef1a5c1719

C:\Users\Admin\AppData\Roaming\msil_napsnap.resources\1\Information.txt

MD5 ec7f08dc78feec4ae8a9e78b24e82721
SHA1 4335266f9d31067ad00b512cb7502177dacedcb9
SHA256 d201206031d264cc1c2f34a79514e1a338c8e3e20e7883d458c0b9a5d726dc3a
SHA512 24fe4eb6fe2576b6d320ccf8cb20027b515fbf5c374c5490d6f6dced329a6aed52a606f40aabf26df922c9571b04324769407779526b3a9a1760baa0aa9954bb

memory/2356-93-0x0000000002A30000-0x0000000002AAD000-memory.dmp

memory/2356-94-0x00000000013F0000-0x00000000013F1000-memory.dmp

memory/2356-95-0x0000000001410000-0x0000000001411000-memory.dmp

memory/2356-96-0x0000000001400000-0x0000000001401000-memory.dmp

memory/2356-97-0x0000000002830000-0x0000000002831000-memory.dmp