Analysis
-
max time kernel
255s -
max time network
144s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
19-05-2020 13:04
Static task
static1
General
-
Target
Darlehensvertrag_42816504192_15052020.vbs
-
Size
36.2MB
-
MD5
e44fb6c9a050ae7ef4b55cce6a71cdcd
-
SHA1
dd77b217e503fddaf28bb60b6e3280a692807976
-
SHA256
c888b058cd85352ec803eb2a6e78bef567b844e9982176efbcd7074982a760de
-
SHA512
9524cdd296cb89eb1cc8a160a62337a908990aa1e6d84b0e51c1827bec705331f458c0713d64cfe221a55ad32331db74a8e9ff4a356d6b2fb515b464e3804ab5
Malware Config
Extracted
qakbot
spx121
1589802571
72.209.191.27:443
72.204.242.138:443
47.202.98.230:443
72.204.242.138:465
96.35.170.82:2222
96.56.237.174:465
65.60.228.130:443
76.187.8.160:443
79.101.206.85:995
64.19.74.29:995
84.117.60.157:443
94.176.128.176:443
72.204.242.138:32102
187.155.61.44:443
72.204.242.138:443
73.163.242.114:443
86.127.7.148:21
76.187.97.98:2222
82.178.63.31:443
174.52.64.212:443
68.174.15.223:443
89.137.162.193:443
24.183.39.93:443
104.50.141.139:995
98.219.77.197:443
72.204.242.138:53
207.255.161.8:32102
1.40.42.4:443
70.183.127.6:995
74.33.69.208:443
66.222.88.126:995
47.152.210.233:443
5.107.144.131:2222
39.32.30.170:993
70.57.15.187:993
63.155.158.242:995
76.170.77.99:443
97.127.144.203:2222
74.215.201.122:443
95.77.144.238:443
72.204.242.138:50003
71.220.191.200:443
67.83.54.76:2222
73.214.231.2:443
68.1.171.93:443
97.119.244.150:443
201.183.224.74:443
75.183.135.48:443
79.118.105.207:443
78.97.207.104:443
65.131.40.143:995
69.92.54.95:995
216.201.162.158:443
78.188.109.130:443
185.219.83.73:443
203.33.139.134:443
41.228.208.39:443
67.209.195.198:3389
208.126.142.17:443
72.218.167.183:995
184.98.104.7:995
72.204.242.138:6881
24.55.152.50:995
210.61.141.92:443
108.58.9.238:993
94.53.92.42:443
35.142.12.163:2222
199.116.241.147:443
71.43.165.10:995
81.196.235.231:443
71.77.252.14:2222
68.204.164.222:443
98.22.234.245:443
76.14.129.53:2222
216.163.4.91:443
179.14.167.91:443
75.87.161.32:995
172.78.87.180:443
74.56.167.31:443
119.95.109.155:2222
117.216.180.195:443
72.204.242.138:993
72.204.242.138:993
50.244.112.10:443
207.255.161.8:995
188.173.214.88:443
174.34.67.106:2222
188.25.231.229:443
39.36.52.207:995
61.1.206.23:443
203.213.104.25:995
24.201.79.208:2078
24.99.180.247:443
184.21.151.81:995
197.50.133.40:443
41.232.226.134:995
5.194.189.247:443
102.41.189.65:995
79.115.170.24:2222
72.224.213.98:2222
95.77.204.208:443
176.252.160.192:443
66.208.105.6:443
184.164.160.157:995
98.118.156.172:443
64.121.114.87:443
107.5.252.194:443
188.173.70.18:443
72.132.249.144:995
80.14.209.42:2222
5.12.252.196:443
61.3.184.206:443
173.81.27.199:443
71.213.29.14:995
49.191.9.180:995
50.247.230.33:995
137.99.224.198:443
71.182.142.63:443
50.78.93.74:443
24.110.96.149:443
47.180.66.10:443
50.104.186.71:443
210.195.170.222:443
104.36.135.227:443
108.51.73.186:443
24.234.86.201:995
47.41.3.40:443
24.43.22.220:995
72.16.212.108:465
84.117.89.128:443
24.27.82.216:2222
75.183.171.155:3389
47.205.231.60:443
66.26.160.37:443
96.56.237.174:993
24.46.40.189:2222
173.79.220.156:443
189.231.211.149:443
47.146.169.85:443
98.115.138.61:443
65.71.77.90:443
50.29.181.193:995
216.110.249.252:2222
68.60.221.169:465
71.187.170.235:443
47.153.115.154:995
197.166.118.115:443
50.244.112.106:443
24.122.228.88:443
96.37.137.42:443
Signatures
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
wnieyjug.exepid process 1572 wnieyjug.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\SpyNet reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\SpyNet reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet reg.exe -
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue = "0" reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Executes dropped EXE 7 IoCs
Processes:
PicturesViewer.exePicturesViewer.exewnieyjug.exewnieyjug.exePicturesViewer.exewnieyjug.exewnieyjug.exepid process 1884 PicturesViewer.exe 1608 PicturesViewer.exe 1572 wnieyjug.exe 1964 wnieyjug.exe 1028 PicturesViewer.exe 484 wnieyjug.exe 952 wnieyjug.exe -
Suspicious use of WriteProcessMemory 81 IoCs
Processes:
WScript.exePicturesViewer.exewnieyjug.exetaskeng.exePicturesViewer.exedescription pid process target process PID 1068 wrote to memory of 1884 1068 WScript.exe PicturesViewer.exe PID 1068 wrote to memory of 1884 1068 WScript.exe PicturesViewer.exe PID 1068 wrote to memory of 1884 1068 WScript.exe PicturesViewer.exe PID 1068 wrote to memory of 1884 1068 WScript.exe PicturesViewer.exe PID 1884 wrote to memory of 1608 1884 PicturesViewer.exe PicturesViewer.exe PID 1884 wrote to memory of 1608 1884 PicturesViewer.exe PicturesViewer.exe PID 1884 wrote to memory of 1608 1884 PicturesViewer.exe PicturesViewer.exe PID 1884 wrote to memory of 1608 1884 PicturesViewer.exe PicturesViewer.exe PID 1884 wrote to memory of 1572 1884 PicturesViewer.exe wnieyjug.exe PID 1884 wrote to memory of 1572 1884 PicturesViewer.exe wnieyjug.exe PID 1884 wrote to memory of 1572 1884 PicturesViewer.exe wnieyjug.exe PID 1884 wrote to memory of 1572 1884 PicturesViewer.exe wnieyjug.exe PID 1884 wrote to memory of 1936 1884 PicturesViewer.exe schtasks.exe PID 1884 wrote to memory of 1936 1884 PicturesViewer.exe schtasks.exe PID 1884 wrote to memory of 1936 1884 PicturesViewer.exe schtasks.exe PID 1884 wrote to memory of 1936 1884 PicturesViewer.exe schtasks.exe PID 1572 wrote to memory of 1964 1572 wnieyjug.exe wnieyjug.exe PID 1572 wrote to memory of 1964 1572 wnieyjug.exe wnieyjug.exe PID 1572 wrote to memory of 1964 1572 wnieyjug.exe wnieyjug.exe PID 1572 wrote to memory of 1964 1572 wnieyjug.exe wnieyjug.exe PID 1572 wrote to memory of 1956 1572 wnieyjug.exe explorer.exe PID 1572 wrote to memory of 1956 1572 wnieyjug.exe explorer.exe PID 1572 wrote to memory of 1956 1572 wnieyjug.exe explorer.exe PID 1572 wrote to memory of 1956 1572 wnieyjug.exe explorer.exe PID 1572 wrote to memory of 1956 1572 wnieyjug.exe explorer.exe PID 1200 wrote to memory of 1028 1200 taskeng.exe PicturesViewer.exe PID 1200 wrote to memory of 1028 1200 taskeng.exe PicturesViewer.exe PID 1200 wrote to memory of 1028 1200 taskeng.exe PicturesViewer.exe PID 1200 wrote to memory of 1028 1200 taskeng.exe PicturesViewer.exe PID 1028 wrote to memory of 1692 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1692 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1692 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1692 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 516 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 516 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 516 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 516 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1448 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1448 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1448 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1448 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1512 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1512 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1512 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1512 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1020 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1020 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1020 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1020 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 2008 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 2008 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 2008 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 2008 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1764 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1764 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1764 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1764 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1180 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1180 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1180 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1180 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1456 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1456 1028 PicturesViewer.exe reg.exe PID 1028 wrote to memory of 1456 1028 PicturesViewer.exe reg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
PicturesViewer.exePicturesViewer.exewnieyjug.exewnieyjug.exeexplorer.exePicturesViewer.exewnieyjug.exewnieyjug.exepid process 1884 PicturesViewer.exe 1608 PicturesViewer.exe 1608 PicturesViewer.exe 1572 wnieyjug.exe 1964 wnieyjug.exe 1964 wnieyjug.exe 1956 explorer.exe 1956 explorer.exe 1028 PicturesViewer.exe 484 wnieyjug.exe 952 wnieyjug.exe 952 wnieyjug.exe -
Loads dropped DLL 4 IoCs
Processes:
PicturesViewer.exePicturesViewer.exepid process 1884 PicturesViewer.exe 1884 PicturesViewer.exe 1884 PicturesViewer.exe 1028 PicturesViewer.exe -
Turns off Windows Defender SpyNet reporting 6 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "2" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet\SpyNetReporting = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet\SubmitSamplesConsent = "2" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\SpyNet\SpyNetReporting = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\SpyNet\SubmitSamplesConsent = "2" reg.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
PicturesViewer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PicturesViewer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PicturesViewer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PicturesViewer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Blacklisted process makes network request 4 IoCs
Processes:
WScript.exeflow pid process 2 1068 WScript.exe 4 1068 WScript.exe 7 1068 WScript.exe 9 1068 WScript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Darlehensvertrag_42816504192_15052020.vbs"1⤵
- Suspicious use of WriteProcessMemory
- Blacklisted process makes network request
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe /C3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exeC:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exe3⤵
- Suspicious behavior: MapViewOfSection
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exeC:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exe /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn vibhuwyoc /tr "\"C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe\" /I vibhuwyoc" /SC ONCE /Z /ST 15:09 /ET 15:213⤵
- Creates scheduled task(s)
PID:1936
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {993A98C4-DF39-4597-990B-D65ECEADDFDC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe /I vibhuwyoc2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:1028 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
- Windows security modification
- Turns off Windows Defender SpyNet reporting
PID:1692
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵
- Windows security modification
- Turns off Windows Defender SpyNet reporting
PID:516
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:1448
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵PID:1512
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
- Windows security modification
- Turns off Windows Defender SpyNet reporting
PID:1020
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵
- Windows security modification
- Turns off Windows Defender SpyNet reporting
PID:2008
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
- Windows security modification
- Turns off Windows Defender SpyNet reporting
PID:1764
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"3⤵
- Windows security modification
- Turns off Windows Defender SpyNet reporting
PID:1180
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue" /d "0"3⤵
- Windows security bypass
PID:1456
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exeC:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exeC:\Users\Admin\AppData\Roaming\Microsoft\Acsubziue\wnieyjug.exe /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe"3⤵PID:1824
-
C:\Windows\system32\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
PID:864
-
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /DELETE /F /TN vibhuwyoc3⤵PID:1760
-
-