Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe
Resource
win7-20240705-en
General
-
Target
06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe
-
Size
2.4MB
-
MD5
ea1227cd8e872accf26b2fa1c1596b38
-
SHA1
d4198173a75fd8cc36e16635badd0905c43d4bc6
-
SHA256
06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea
-
SHA512
236e6ab36184af1eb85e6c8bb2357e0a3d9e2674eff3d5208c9dbaffae0541f73c066cda90131c2d08c967bdf07749812cd8fe89661f143e7be7d8434274994c
-
SSDEEP
49152:bh+ZkldoPK8YaGMOtjR/uuO3qn1C5Qs2fA3FJ8nfy7iShZji7/M:E2cPK84hjR/ci1C51MAVJ8WUr
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1296 attrib.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000016d9e-37.dat acprotect -
Executes dropped EXE 5 IoCs
pid Process 2388 Build.exe 2820 SRCOM.exe 2324 SRCOM.module.exe 2356 SRCOM.exe 2280 SRCOM.exe -
Loads dropped DLL 8 IoCs
pid Process 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 2820 SRCOM.exe 2820 SRCOM.exe 2820 SRCOM.exe 2820 SRCOM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0008000000016d9e-37.dat upx behavioral1/memory/2820-42-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/2820-41-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/files/0x0008000000018f58-68.dat upx behavioral1/memory/2820-72-0x0000000002860000-0x00000000028DD000-memory.dmp upx behavioral1/memory/2324-80-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/2820-82-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx behavioral1/memory/2820-83-0x0000000061E00000-0x0000000061ED2000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ipapi.co 10 ipapi.co -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016cd7-6.dat autoit_exe behavioral1/memory/2388-27-0x0000000000CC0000-0x0000000000E92000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ SRCOM.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ SRCOM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage SRCOM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SRCOM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage SRCOM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language SRCOM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Build.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage SRCOM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SRCOM.module.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SRCOM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SRCOM.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language SRCOM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language SRCOM.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ Build.exe File opened for modification C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\winmgmts:\localhost\ SRCOM.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2932 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 SRCOM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2324 SRCOM.module.exe Token: 35 2324 SRCOM.module.exe Token: SeSecurityPrivilege 2324 SRCOM.module.exe Token: SeSecurityPrivilege 2324 SRCOM.module.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2388 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 30 PID 2144 wrote to memory of 2388 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 30 PID 2144 wrote to memory of 2388 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 30 PID 2144 wrote to memory of 2388 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 30 PID 2144 wrote to memory of 2932 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 31 PID 2144 wrote to memory of 2932 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 31 PID 2144 wrote to memory of 2932 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 31 PID 2144 wrote to memory of 2932 2144 06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe 31 PID 2388 wrote to memory of 2820 2388 Build.exe 32 PID 2388 wrote to memory of 2820 2388 Build.exe 32 PID 2388 wrote to memory of 2820 2388 Build.exe 32 PID 2388 wrote to memory of 2820 2388 Build.exe 32 PID 2820 wrote to memory of 2324 2820 SRCOM.exe 34 PID 2820 wrote to memory of 2324 2820 SRCOM.exe 34 PID 2820 wrote to memory of 2324 2820 SRCOM.exe 34 PID 2820 wrote to memory of 2324 2820 SRCOM.exe 34 PID 2820 wrote to memory of 1296 2820 SRCOM.exe 37 PID 2820 wrote to memory of 1296 2820 SRCOM.exe 37 PID 2820 wrote to memory of 1296 2820 SRCOM.exe 37 PID 2820 wrote to memory of 1296 2820 SRCOM.exe 37 PID 1128 wrote to memory of 2356 1128 taskeng.exe 40 PID 1128 wrote to memory of 2356 1128 taskeng.exe 40 PID 1128 wrote to memory of 2356 1128 taskeng.exe 40 PID 1128 wrote to memory of 2356 1128 taskeng.exe 40 PID 1128 wrote to memory of 2280 1128 taskeng.exe 41 PID 1128 wrote to memory of 2280 1128 taskeng.exe 41 PID 1128 wrote to memory of 2280 1128 taskeng.exe 41 PID 1128 wrote to memory of 2280 1128 taskeng.exe 41 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1296 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe"C:\Users\Admin\AppData\Local\Temp\06c8f98340f8db546d006d28f323fd4ab4164f2427ac026978d10e988e1d22ea.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\EURasmDWcKslBl23ad6bieMDg\Build.exe"C:\Users\Admin\AppData\Roaming\EURasmDWcKslBl23ad6bieMDg\Build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.module.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\ENU_687FE9749671230E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\1\*"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1296
-
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\EURasmDWcKslBl23ad6bieMDg\Install.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2932
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F649EBD3-9E89-4561-9524-50D41135D095} S-1-5-21-3502430532-24693940-2469786940-1000:PSBQWFYT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD5bf13c5f776b8c4d1808031183daa2541
SHA1b3bfac9345920d34261ec91a15b8fc254e19d6f6
SHA256658cf383990734a2bdc78c5a97385b1deb8ebc5b3c4db450887c6a4d076427a9
SHA512f7770902561336d8e270819f9b627db8132d4ee10fae1d9adf6e475ebb481cc95e5f277c830fe3a96da6c5881f82631ac1841c6ab8ba99c038593000188127d2
-
Filesize
3KB
MD57ce0a1ed2b4c035f8628322981c2dd6a
SHA1d574694fbd998d4ec6cf9b0d1e660391de4e5c08
SHA2568f921aa0dda9a1600e96653706c934a9dff45b850fee0d908b389749d36ae5d0
SHA512d904934d76344e724dc960e967a2c3a403f946659ce67a738c57c03e2d75a5728662e7bd2a5ae7398479bb12cccf89c33682e03895d5c9e5b99a1dd56c7a2653
-
Filesize
66KB
MD500ac4890775455e2225b56ef039a9fd9
SHA13e1a37e33131cd2f03a1a1efc123f5ef28a58a8b
SHA2561098acf6c4bbc59a1dbc672f9da5113919776b6ef35b57550d1f1f6a792b5b8b
SHA51289a566402d4976c64426db8dc6a6e67881d82a1aed1d5cad5d3818e0a2fc5dadf3c3a0cc0d50bd9d8bfe4ed8849d89191e0ff046f6a383c8d36d52dcf9aeb171
-
Filesize
197KB
MD58da8b938f8df69f065784aa15679baaa
SHA1c629d74ad7d76c2ffabbf9e189038a8f464ac58d
SHA2560b3d46c31892f062d02533731000aa42ebabc36516406b963ddac84e6b08f81b
SHA512c38fa39e98dd78ca4e1ab33fef5f3f9a2d453ae831040df2ae738a3e42332280a0e2c54f75afbeca5d56ba894b219cf49b8f4ee78c04dd5e9dafe4fceb72ee4c
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.sqlite3.module.dll.3
Filesize360KB
MD5834319fad847cf724f88da386f769c60
SHA122c5149aff443c98b0a92c594a0d8dd78a906eb9
SHA256d6787f1494584ca2268fa2b9c92391aafc93493ce0ef96978f6c88bbc1763448
SHA512349db83464abf7b43fe890fca40a7122882d26aff38415d40fb73cf63be74f289cc9aad366f1dff13a67b3757de90f6650fabc593974f2bd1b4c0e773345c16e
-
Filesize
1.8MB
MD5f6a61808fe81fd61f089898b32fe7e01
SHA10b517c53b2ced979330c6a86ede8308779d93501
SHA2568a943b5e22c2a429bac3bbbe4ce16d297d7e623adf6e07c61b25c3f46b7332ae
SHA51278ed59c2bad393c0e1adbd020293268c554551cbd6637c785881f56ae3d70144bae21f9c280f014bf1d0a8f8ab2f1fd51cac1ca46f37e80a73460218dd1115b1
-
Filesize
197KB
MD5946285055913d457fda78a4484266e96
SHA1668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285
SHA25623ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb
SHA51230a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95
-
\Users\Admin\AppData\Roaming\amd64_microsoft-windows-g..icy-policymaker-mof\SRCOM.sqlite3.module.dll
Filesize360KB
MD58c127ce55bfbb55eb9a843c693c9f240
SHA175c462c935a7ff2c90030c684440d61d48bb1858
SHA2564f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028
SHA512d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02