Analysis
-
max time kernel
146s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:58
Behavioral task
behavioral1
Sample
8888888.exe
Resource
win7v20201028
General
-
Target
8888888.exe
-
Size
1.0MB
-
MD5
187f43c716b1f67efa2e3e98027f497e
-
SHA1
2076d9ecbcec60b0b4fc181917fd85246037f1cc
-
SHA256
760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
-
SHA512
ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
Malware Config
Extracted
qakbot
spx140
1592218484
141.126.10.226:443
96.35.170.82:2222
67.250.184.157:443
24.42.14.241:995
72.173.20.55:443
173.172.205.216:443
173.3.132.17:995
172.78.30.215:443
207.255.161.8:32103
206.51.202.106:50003
24.152.219.253:995
207.255.161.8:2222
80.14.209.42:2222
72.142.106.198:465
207.255.161.8:2087
142.129.227.86:443
98.219.77.197:443
166.62.180.194:2078
82.127.193.151:2222
24.229.245.124:995
104.50.141.139:995
50.247.230.33:995
207.255.161.8:2078
193.23.5.134:443
65.24.76.114:443
67.246.16.250:995
24.99.180.247:443
151.73.124.242:443
81.245.66.237:995
86.127.13.79:21
96.18.240.158:443
65.116.179.83:443
188.173.185.139:443
200.113.201.83:993
93.118.83.174:443
98.16.204.189:995
72.36.59.46:2222
67.165.206.193:995
184.180.157.203:2222
49.191.4.245:443
104.221.4.11:2222
72.204.242.138:20
140.82.21.191:443
203.33.138.230:443
76.86.57.179:2222
64.19.74.29:995
73.104.218.229:0
201.209.4.83:2078
72.177.157.217:995
65.100.247.6:2083
82.77.169.118:2222
156.213.179.74:443
118.168.236.121:443
85.121.42.12:995
188.173.214.88:443
36.236.233.206:443
122.147.204.4:995
73.244.83.199:443
188.192.75.8:443
89.212.207.43:443
67.182.188.217:443
46.214.86.217:443
75.81.25.223:443
75.170.118.26:443
84.255.149.19:443
79.116.229.37:443
173.245.152.231:443
5.13.84.244:995
95.76.31.12:443
98.121.187.78:443
178.221.64.104:995
93.118.209.198:443
89.137.162.193:443
69.11.247.242:443
207.255.161.8:32100
73.217.4.42:443
82.81.172.21:443
50.244.112.106:443
216.163.4.132:443
68.190.152.98:443
75.110.250.89:443
35.142.12.163:2222
68.200.23.189:443
80.195.103.146:2222
86.153.98.37:2222
36.77.151.211:443
100.38.123.22:443
76.189.50.251:443
173.170.121.166:443
77.159.149.74:443
96.41.93.96:443
108.54.205.207:443
76.187.8.160:443
96.56.237.174:32103
173.175.29.210:443
203.198.96.69:443
117.218.208.239:443
72.204.242.138:32100
51.223.2.17:443
79.115.254.172:443
188.192.75.8:995
86.126.97.183:2222
81.133.234.36:2222
78.96.192.26:443
98.116.62.242:443
189.231.198.212:443
62.121.85.253:995
173.187.101.221:443
104.235.72.17:443
72.204.242.138:53
105.100.66.69:443
197.165.161.55:995
86.120.53.204:443
72.29.181.77:2078
24.122.228.88:443
216.229.92.42:995
101.108.113.210:443
67.83.54.76:2222
5.193.61.212:2222
45.77.215.141:443
1.40.42.4:443
70.95.118.217:443
86.121.95.197:2222
207.246.71.122:443
144.202.48.107:443
201.215.29.153:443
64.224.76.152:443
41.228.204.87:443
108.39.93.45:443
97.93.211.17:443
83.110.222.11:443
69.92.54.95:995
66.222.88.126:995
207.255.161.8:32102
24.122.157.93:443
203.122.7.82:443
24.43.22.220:993
74.75.216.202:443
100.4.173.223:443
68.225.56.31:443
72.204.242.138:32102
108.190.151.108:2222
190.158.225.3:443
50.244.112.10:443
24.183.39.93:443
39.37.232.43:995
24.43.22.220:995
72.209.191.27:443
79.114.199.39:443
71.187.170.235:443
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exe cryptone -
Executes dropped EXE 2 IoCs
Processes:
hxewqsa.exehxewqsa.exepid process 3048 hxewqsa.exe 3756 hxewqsa.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
hxewqsa.exe8888888.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 hxewqsa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc hxewqsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 hxewqsa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 8888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 8888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service 8888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service hxewqsa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc hxewqsa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service hxewqsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 8888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service 8888888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 8888888.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
8888888.exe8888888.exehxewqsa.exehxewqsa.exeexplorer.exepid process 3336 8888888.exe 3336 8888888.exe 3580 8888888.exe 3580 8888888.exe 3580 8888888.exe 3580 8888888.exe 3048 hxewqsa.exe 3048 hxewqsa.exe 3756 hxewqsa.exe 3756 hxewqsa.exe 3756 hxewqsa.exe 3756 hxewqsa.exe 3616 explorer.exe 3616 explorer.exe 3616 explorer.exe 3616 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
hxewqsa.exepid process 3048 hxewqsa.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
8888888.exehxewqsa.exedescription pid process target process PID 3336 wrote to memory of 3580 3336 8888888.exe 8888888.exe PID 3336 wrote to memory of 3580 3336 8888888.exe 8888888.exe PID 3336 wrote to memory of 3580 3336 8888888.exe 8888888.exe PID 3336 wrote to memory of 3048 3336 8888888.exe hxewqsa.exe PID 3336 wrote to memory of 3048 3336 8888888.exe hxewqsa.exe PID 3336 wrote to memory of 3048 3336 8888888.exe hxewqsa.exe PID 3336 wrote to memory of 2312 3336 8888888.exe schtasks.exe PID 3336 wrote to memory of 2312 3336 8888888.exe schtasks.exe PID 3336 wrote to memory of 2312 3336 8888888.exe schtasks.exe PID 3048 wrote to memory of 3756 3048 hxewqsa.exe hxewqsa.exe PID 3048 wrote to memory of 3756 3048 hxewqsa.exe hxewqsa.exe PID 3048 wrote to memory of 3756 3048 hxewqsa.exe hxewqsa.exe PID 3048 wrote to memory of 3616 3048 hxewqsa.exe explorer.exe PID 3048 wrote to memory of 3616 3048 hxewqsa.exe explorer.exe PID 3048 wrote to memory of 3616 3048 hxewqsa.exe explorer.exe PID 3048 wrote to memory of 3616 3048 hxewqsa.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8888888.exe"C:\Users\Admin\AppData\Local\Temp\8888888.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8888888.exeC:\Users\Admin\AppData\Local\Temp\8888888.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exeC:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exeC:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn iryfoqewci /tr "\"C:\Users\Admin\AppData\Local\Temp\8888888.exe\" /I iryfoqewci" /SC ONCE /Z /ST 05:22 /ET 05:342⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\8888888.exeC:\Users\Admin\AppData\Local\Temp\8888888.exe /I iryfoqewci1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.datMD5
084502570adeeae65213debd59c90bd5
SHA1e0ed26351fb443ecfdc0d6006319eb26689d7b53
SHA256e277e6ca70ec1358d043ab3360538ad84c391636d68ce5ff0c8ded44446b09d4
SHA512db2e8f36925d88602ff6f90e26a7f97bef4ad7d00b1850283e74ef57cac3dd6aeca49a67c53842874d8d16f452cadaeb5d9f813304f703d4bf3497d2abfc81cd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Oifxixok\hxewqsa.exeMD5
187f43c716b1f67efa2e3e98027f497e
SHA12076d9ecbcec60b0b4fc181917fd85246037f1cc
SHA256760e82acfcfdb3f7a2ea01cb32a21562bf98d4855cca19710aabd4af329aa809
SHA512ce53dc168c27f7359ba5f2fe14dd0852bb2dc7193dd1d8990cf42c22920253088d8ed0f0e0f314f6dc0bdbd0851826e30f9efdcd9eee4ba4afa8a20720ce0ee2
-
memory/2312-5-0x0000000000000000-mapping.dmp
-
memory/3048-2-0x0000000000000000-mapping.dmp
-
memory/3048-9-0x00000000021C0000-0x00000000021FA000-memory.dmpFilesize
232KB
-
memory/3580-0-0x0000000000000000-mapping.dmp
-
memory/3580-1-0x00000000026C0000-0x00000000026C1000-memory.dmpFilesize
4KB
-
memory/3616-10-0x0000000000000000-mapping.dmp
-
memory/3756-6-0x0000000000000000-mapping.dmp
-
memory/3756-8-0x0000000002750000-0x0000000002751000-memory.dmpFilesize
4KB