Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:58
Behavioral task
behavioral1
Sample
8888888.exe
Resource
win7v20201028
General
-
Target
8888888.exe
-
Size
1.0MB
-
MD5
187f43c716b1f67efa2e3e98027f497e
-
SHA1
2076d9ecbcec60b0b4fc181917fd85246037f1cc
-
SHA256
760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
-
SHA512
ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
Malware Config
Extracted
qakbot
spx140
1592218484
141.126.10.226:443
96.35.170.82:2222
67.250.184.157:443
24.42.14.241:995
72.173.20.55:443
173.172.205.216:443
173.3.132.17:995
172.78.30.215:443
207.255.161.8:32103
206.51.202.106:50003
24.152.219.253:995
207.255.161.8:2222
80.14.209.42:2222
72.142.106.198:465
207.255.161.8:2087
142.129.227.86:443
98.219.77.197:443
166.62.180.194:2078
82.127.193.151:2222
24.229.245.124:995
104.50.141.139:995
50.247.230.33:995
207.255.161.8:2078
193.23.5.134:443
65.24.76.114:443
67.246.16.250:995
24.99.180.247:443
151.73.124.242:443
81.245.66.237:995
86.127.13.79:21
96.18.240.158:443
65.116.179.83:443
188.173.185.139:443
200.113.201.83:993
93.118.83.174:443
98.16.204.189:995
72.36.59.46:2222
67.165.206.193:995
184.180.157.203:2222
49.191.4.245:443
104.221.4.11:2222
72.204.242.138:20
140.82.21.191:443
203.33.138.230:443
76.86.57.179:2222
64.19.74.29:995
73.104.218.229:0
201.209.4.83:2078
72.177.157.217:995
65.100.247.6:2083
82.77.169.118:2222
156.213.179.74:443
118.168.236.121:443
85.121.42.12:995
188.173.214.88:443
36.236.233.206:443
122.147.204.4:995
73.244.83.199:443
188.192.75.8:443
89.212.207.43:443
67.182.188.217:443
46.214.86.217:443
75.81.25.223:443
75.170.118.26:443
84.255.149.19:443
79.116.229.37:443
173.245.152.231:443
5.13.84.244:995
95.76.31.12:443
98.121.187.78:443
178.221.64.104:995
93.118.209.198:443
89.137.162.193:443
69.11.247.242:443
207.255.161.8:32100
73.217.4.42:443
82.81.172.21:443
50.244.112.106:443
216.163.4.132:443
68.190.152.98:443
75.110.250.89:443
35.142.12.163:2222
68.200.23.189:443
80.195.103.146:2222
86.153.98.37:2222
36.77.151.211:443
100.38.123.22:443
76.189.50.251:443
173.170.121.166:443
77.159.149.74:443
96.41.93.96:443
108.54.205.207:443
76.187.8.160:443
96.56.237.174:32103
173.175.29.210:443
203.198.96.69:443
117.218.208.239:443
72.204.242.138:32100
51.223.2.17:443
79.115.254.172:443
188.192.75.8:995
86.126.97.183:2222
81.133.234.36:2222
78.96.192.26:443
98.116.62.242:443
189.231.198.212:443
62.121.85.253:995
173.187.101.221:443
104.235.72.17:443
72.204.242.138:53
105.100.66.69:443
197.165.161.55:995
86.120.53.204:443
72.29.181.77:2078
24.122.228.88:443
216.229.92.42:995
101.108.113.210:443
67.83.54.76:2222
5.193.61.212:2222
45.77.215.141:443
1.40.42.4:443
70.95.118.217:443
86.121.95.197:2222
207.246.71.122:443
144.202.48.107:443
201.215.29.153:443
64.224.76.152:443
41.228.204.87:443
108.39.93.45:443
97.93.211.17:443
83.110.222.11:443
69.92.54.95:995
66.222.88.126:995
207.255.161.8:32102
24.122.157.93:443
203.122.7.82:443
24.43.22.220:993
74.75.216.202:443
100.4.173.223:443
68.225.56.31:443
72.204.242.138:32102
108.190.151.108:2222
190.158.225.3:443
50.244.112.10:443
24.183.39.93:443
39.37.232.43:995
24.43.22.220:995
72.209.191.27:443
79.114.199.39:443
71.187.170.235:443
Signatures
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exe cryptone \Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exe cryptone -
Executes dropped EXE 2 IoCs
Processes:
tsaoo.exetsaoo.exepid process 792 tsaoo.exe 1184 tsaoo.exe -
Loads dropped DLL 2 IoCs
Processes:
8888888.exepid process 1880 8888888.exe 1880 8888888.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
8888888.exe8888888.exetsaoo.exetsaoo.exeexplorer.exepid process 1880 8888888.exe 1700 8888888.exe 1700 8888888.exe 792 tsaoo.exe 1184 tsaoo.exe 1184 tsaoo.exe 968 explorer.exe 968 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
tsaoo.exepid process 792 tsaoo.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
8888888.exetsaoo.exetaskeng.exedescription pid process target process PID 1880 wrote to memory of 1700 1880 8888888.exe 8888888.exe PID 1880 wrote to memory of 1700 1880 8888888.exe 8888888.exe PID 1880 wrote to memory of 1700 1880 8888888.exe 8888888.exe PID 1880 wrote to memory of 1700 1880 8888888.exe 8888888.exe PID 1880 wrote to memory of 792 1880 8888888.exe tsaoo.exe PID 1880 wrote to memory of 792 1880 8888888.exe tsaoo.exe PID 1880 wrote to memory of 792 1880 8888888.exe tsaoo.exe PID 1880 wrote to memory of 792 1880 8888888.exe tsaoo.exe PID 1880 wrote to memory of 656 1880 8888888.exe schtasks.exe PID 1880 wrote to memory of 656 1880 8888888.exe schtasks.exe PID 1880 wrote to memory of 656 1880 8888888.exe schtasks.exe PID 1880 wrote to memory of 656 1880 8888888.exe schtasks.exe PID 792 wrote to memory of 1184 792 tsaoo.exe tsaoo.exe PID 792 wrote to memory of 1184 792 tsaoo.exe tsaoo.exe PID 792 wrote to memory of 1184 792 tsaoo.exe tsaoo.exe PID 792 wrote to memory of 1184 792 tsaoo.exe tsaoo.exe PID 792 wrote to memory of 968 792 tsaoo.exe explorer.exe PID 792 wrote to memory of 968 792 tsaoo.exe explorer.exe PID 792 wrote to memory of 968 792 tsaoo.exe explorer.exe PID 792 wrote to memory of 968 792 tsaoo.exe explorer.exe PID 792 wrote to memory of 968 792 tsaoo.exe explorer.exe PID 544 wrote to memory of 684 544 taskeng.exe 8888888.exe PID 544 wrote to memory of 684 544 taskeng.exe 8888888.exe PID 544 wrote to memory of 684 544 taskeng.exe 8888888.exe PID 544 wrote to memory of 684 544 taskeng.exe 8888888.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8888888.exe"C:\Users\Admin\AppData\Local\Temp\8888888.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8888888.exeC:\Users\Admin\AppData\Local\Temp\8888888.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exeC:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exeC:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exe /C3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn fssekdxd /tr "\"C:\Users\Admin\AppData\Local\Temp\8888888.exe\" /I fssekdxd" /SC ONCE /Z /ST 05:22 /ET 05:342⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {5DA828A4-F8F3-49D8-8B25-77CD61B8436C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8888888.exeC:\Users\Admin\AppData\Local\Temp\8888888.exe /I fssekdxd2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.datMD5
95209c537b9159d49ef6fcceaf602fb8
SHA18651ad8676fd757f9ea161441087d2f2b1b4c550
SHA2563afc39a1e8930f9b2637848bd1325bd7953b93e2975392ee1ee380a794b22328
SHA512a5ed760e578882809942f006d1785dc2dcc5f4047a484bfce102c2456ca06f2c398fe524344f7530f839efc29994faf15c25057c84931b0feb970217caf64e71
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
\Users\Admin\AppData\Roaming\Microsoft\Lrepxyxrrah\tsaoo.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
memory/656-6-0x0000000000000000-mapping.dmp
-
memory/684-14-0x0000000000000000-mapping.dmp
-
memory/792-4-0x0000000000000000-mapping.dmp
-
memory/792-11-0x0000000000380000-0x00000000003BA000-memory.dmpFilesize
232KB
-
memory/968-12-0x0000000000000000-mapping.dmp
-
memory/1184-8-0x0000000000000000-mapping.dmp
-
memory/1184-10-0x0000000002580000-0x0000000002591000-memory.dmpFilesize
68KB
-
memory/1700-0-0x0000000000000000-mapping.dmp
-
memory/1700-1-0x0000000002380000-0x0000000002391000-memory.dmpFilesize
68KB