Analysis
-
max time kernel
130s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
Private_Cheat by pc_Ret v8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Private_Cheat by pc_Ret v8.exe
Resource
win10v2004-20250217-en
General
-
Target
Private_Cheat by pc_Ret v8.exe
-
Size
2.8MB
-
MD5
9f031ba9a4e474e8a87e16e49bf61bc4
-
SHA1
37f4299fb8888fd7bc477e659e50adac41c3f4f1
-
SHA256
7921c12179578321423314c5458842e5f057609027c7b0a7fb4c072295ad8d6b
-
SHA512
95218bbf2f905d791e7aca7d659eaca073f132e6380a2b0a4c152785653618cb919b5e3d0455c57094e99f414283b459c2280703785ace3a929a6c03235d1e5a
-
SSDEEP
49152:ah+ZkldoPK8YaMWS1/D+MRMOtjR/zTqny/f5ft1xSKHYS:z2cPK821/iMRhjR/zXR1jT
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\1\Information.txt
qulab
http://teleg.run/QulabZ
Signatures
-
Qulab family
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 328 attrib.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00060000000195d6-55.dat acprotect -
Executes dropped EXE 6 IoCs
pid Process 1968 Baldr (11).exe 2612 Build.exe 2772 Wpc.exe 2296 Wpc.module.exe 1108 Wpc.exe 288 Wpc.exe -
Loads dropped DLL 11 IoCs
pid Process 2508 Private_Cheat by pc_Ret v8.exe 2508 Private_Cheat by pc_Ret v8.exe 2508 Private_Cheat by pc_Ret v8.exe 2508 Private_Cheat by pc_Ret v8.exe 2508 Private_Cheat by pc_Ret v8.exe 2508 Private_Cheat by pc_Ret v8.exe 2508 Private_Cheat by pc_Ret v8.exe 2508 Private_Cheat by pc_Ret v8.exe 2772 Wpc.exe 2772 Wpc.exe 2772 Wpc.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1968-39-0x00000000001E0000-0x0000000000226000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ipapi.co 10 ipapi.co -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00060000000186c6-26.dat autoit_exe behavioral1/memory/2612-45-0x00000000009B0000-0x0000000000B87000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ Wpc.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\localhost\ Wpc.exe -
resource yara_rule behavioral1/files/0x00060000000195d6-55.dat upx behavioral1/memory/2772-59-0x0000000061E00000-0x0000000061ED1000-memory.dmp upx behavioral1/files/0x000700000001960c-100.dat upx behavioral1/memory/2296-105-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2296-109-0x0000000000400000-0x000000000048E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wpc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage Wpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wpc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Baldr (11).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage Wpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Private_Cheat by pc_Ret v8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Wpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wpc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage Wpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wpc.module.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Wpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Wpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ Build.exe File opened for modification C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\winmgmts:\localhost\ Wpc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2772 Wpc.exe 1968 Baldr (11).exe 1968 Baldr (11).exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1968 Baldr (11).exe Token: SeRestorePrivilege 2296 Wpc.module.exe Token: 35 2296 Wpc.module.exe Token: SeSecurityPrivilege 2296 Wpc.module.exe Token: SeSecurityPrivilege 2296 Wpc.module.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1968 2508 Private_Cheat by pc_Ret v8.exe 30 PID 2508 wrote to memory of 1968 2508 Private_Cheat by pc_Ret v8.exe 30 PID 2508 wrote to memory of 1968 2508 Private_Cheat by pc_Ret v8.exe 30 PID 2508 wrote to memory of 1968 2508 Private_Cheat by pc_Ret v8.exe 30 PID 2508 wrote to memory of 2612 2508 Private_Cheat by pc_Ret v8.exe 31 PID 2508 wrote to memory of 2612 2508 Private_Cheat by pc_Ret v8.exe 31 PID 2508 wrote to memory of 2612 2508 Private_Cheat by pc_Ret v8.exe 31 PID 2508 wrote to memory of 2612 2508 Private_Cheat by pc_Ret v8.exe 31 PID 2612 wrote to memory of 2772 2612 Build.exe 32 PID 2612 wrote to memory of 2772 2612 Build.exe 32 PID 2612 wrote to memory of 2772 2612 Build.exe 32 PID 2612 wrote to memory of 2772 2612 Build.exe 32 PID 2772 wrote to memory of 2296 2772 Wpc.exe 34 PID 2772 wrote to memory of 2296 2772 Wpc.exe 34 PID 2772 wrote to memory of 2296 2772 Wpc.exe 34 PID 2772 wrote to memory of 2296 2772 Wpc.exe 34 PID 1384 wrote to memory of 1108 1384 taskeng.exe 40 PID 1384 wrote to memory of 1108 1384 taskeng.exe 40 PID 1384 wrote to memory of 1108 1384 taskeng.exe 40 PID 1384 wrote to memory of 1108 1384 taskeng.exe 40 PID 1384 wrote to memory of 288 1384 taskeng.exe 41 PID 1384 wrote to memory of 288 1384 taskeng.exe 41 PID 1384 wrote to memory of 288 1384 taskeng.exe 41 PID 1384 wrote to memory of 288 1384 taskeng.exe 41 PID 2772 wrote to memory of 328 2772 Wpc.exe 42 PID 2772 wrote to memory of 328 2772 Wpc.exe 42 PID 2772 wrote to memory of 328 2772 Wpc.exe 42 PID 2772 wrote to memory of 328 2772 Wpc.exe 42 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 328 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Private_Cheat by pc_Ret v8.exe"C:\Users\Admin\AppData\Local\Temp\Private_Cheat by pc_Ret v8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\Z1004308289\Baldr (11).exe"C:\Users\Admin\AppData\Roaming\Z1004308289\Baldr (11).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Users\Admin\AppData\Roaming\Z1004308289\Build.exe"C:\Users\Admin\AppData\Roaming\Z1004308289\Build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.module.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\ENU_687FE9743E45358E9D41.7z" "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\1\*"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:328
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1800
-
C:\Windows\system32\taskeng.exetaskeng.exe {646E2AD0-DD4A-4F5B-A93E-55086E1F11C9} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.exeC:\Users\Admin\AppData\Roaming\x86_microsoft-windows-winre-recoveryagent\Wpc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:288
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57710d553e44f5b9ec06b3854106ac57d
SHA1988fc89ccd4237ad2361334d3f499fb79e8b8ed0
SHA25678e0488ad171d671f178eb85afecc0360dd289179e79f6cdb1bcf92007a89647
SHA512c0883ab0307b532ce1d19a432405fe145ed329c489b390229acf168441b0a99445e9f712bb447f39011c1d9e5cffbb01efe82e522b7b6809ac62de8eeb9a6269
-
Filesize
49KB
MD5cddf0f071ec467ebab80f9eb03159c74
SHA146157f661111fb091386910c4f470064dba78d2a
SHA256917d4be7ccb15a681100dfa7439ff9235f741aeb2bd1cdcfb961ca53b13a5450
SHA512ce5335085a0b5d4e25819eae78d7053cd7de92b957df444cd9d689cdcf6813d276b4e1a4520e20e613fc3f3575ff789bdb9d3d0977a15abcf720ac437e4e2a07
-
Filesize
218KB
MD5e82f9401a1e258f204020186f9a714ec
SHA19493e1ecaf8d24dc41df6811b96b459fe046dbdc
SHA25676eb583552ef509e5c1c2cac4abc8442c0bbd59ce5c78a46c0f3da18158d542e
SHA512f3514debb1e1f1a5dea4565e236105adbdbe05cbe509e8335ad4f1558b4beffbfbf0c519bcb4530760f5a3c39743ff1935818949c140bb694803a8ad15beddaf
-
Filesize
359KB
MD5434da06978e9724ffa6d90b93ef62c75
SHA1d469ed20d82e8dec3140aec8d52b4d56d975dedc
SHA2566350e9044f2ac74d8d51793a8b446b944081e533bf2915faf9bc14aaa0c55795
SHA512391404b4678f296d74d2bc81ae89bb4c423199adc509e69cd573717313ac3078e0f09a90e1dd4e618001608ae5b5aa0f10ae7855d98866179dc05cebfc50053c
-
Filesize
321KB
MD5d24276ac40d35830f2b62afae1eb92a4
SHA1eef691098d9635be8aa8739a3830aae5be889ef7
SHA2563675e60b99fbbf818883e12da047223ef7490f08fd52df40867785e4586186e7
SHA512ede7e171d73d64c20681362420f1662a8871bc6dffec806ced6800e3147f2f2d452be68ef738eebe71fce34d24f6549174cb930c1c7368266d416fd40d8db5aa
-
Filesize
1.8MB
MD5e30988e3026df37370cac7ce85faec85
SHA17e2f2cecb759372b6e381afbcda9dffc3e475ad9
SHA25637bc62e63d2cccc8c326ba42dfbc24d0ed2a2ec967eb4b24c1dce9dedbda5d08
SHA512ae21cee091a3bb2109552508a2f03c46c9c6ea63a2b33c794fce9b6ee3ceae185e9a06ccf6d11894696b231935c5c3c5dfea9aec370b1b4282a5bce58fde1c7b
-
Filesize
218KB
MD59c5b4e4fcae7eb410f09c9e46ffb4a6d
SHA19d233bbe69676b1064f1deafba8e70a9acc00773
SHA2560376139308f3e83a73b76d3938d9c100779a83b98eeb3b3ebacfcbd1cc027fe9
SHA51259c35d730dc17e790aa4c89f82fd2f64b4d67405c2bdf21d4a9757fa8bfb64461f1247c9da482b310b117f1a24144bf6c612c9f7587577b7a286e2e3de724ee5
-
Filesize
359KB
MD5a6e1b13b0b624094e6fb3a7bedb70930
SHA184b58920afd8e88181c4286fa2438af81f097781
SHA2563b266088e1eb148534a8f95610e07749f7254f29d19f6f6686a1f0c85c9241bd
SHA51226c2dffb44b7b0c2eb6e8fde7d5c6dce118af14971552bedeb131436f53edd28da98af8cf219bb7814cf4563624638cf73c7017fc3936b5112ff9f8c43f11591