Analysis
-
max time kernel
150s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:51
Behavioral task
behavioral1
Sample
88888888.exe
Resource
win7v20201028
General
-
Target
88888888.exe
-
Size
1.2MB
-
MD5
086a4a65d3ea48a2e4e069ae1002335b
-
SHA1
ae0751887692ce6537f05c37dbe811eaa2f56a75
-
SHA256
f392fec11d15f4c5ca3f5c340c28e99bd19f99d59422b5598fd818be653502bb
-
SHA512
1655b6bd0b9a6047f6ba60fab8c37515b70b2b039129033ad3452cadeb6f4b05bf7b750ba7e39392b53daf4cb145ab9fdee863dc981c5121dafa3564dcb847bc
Malware Config
Extracted
qakbot
spx137
1591786935
31.5.116.167:443
69.40.17.142:443
151.73.124.242:443
193.248.44.2:2222
188.26.249.181:443
96.41.93.96:443
46.214.86.217:443
62.121.123.57:443
66.76.105.152:443
197.165.229.113:443
173.175.29.210:443
172.242.156.50:995
5.15.237.243:443
80.240.26.178:443
209.59.86.138:443
31.5.21.66:443
105.100.59.144:443
108.30.125.94:443
67.250.184.157:443
47.146.169.85:443
35.142.12.163:2222
75.110.250.89:443
75.183.171.155:3389
96.37.137.42:443
67.209.195.198:3389
80.195.103.146:2222
74.56.167.31:443
76.86.57.179:2222
49.191.4.245:443
80.14.209.42:2222
86.124.216.196:21
98.114.185.3:443
96.35.170.82:2222
82.77.169.118:2222
50.104.68.223:443
81.133.234.36:2222
69.28.222.54:443
24.201.79.208:2078
72.204.242.138:443
86.122.20.93:443
73.226.220.56:443
184.96.155.4:993
70.168.130.172:443
68.174.15.223:443
98.115.138.61:443
75.87.161.32:995
5.14.188.235:443
174.30.168.163:2222
95.77.144.238:443
69.246.151.5:995
207.255.161.8:32103
50.29.181.193:995
68.49.120.179:443
200.75.136.78:443
98.118.156.172:443
69.92.54.95:995
74.135.37.79:443
207.255.161.8:32102
98.219.77.197:443
66.222.88.126:995
108.58.9.238:995
47.152.210.233:443
47.203.42.163:443
24.229.245.124:995
82.127.193.151:2222
72.204.242.138:20
72.45.14.185:443
104.36.135.227:443
24.42.14.241:443
74.129.26.133:443
24.228.7.174:443
47.40.244.237:443
84.117.60.157:443
71.79.144.56:443
188.173.214.88:443
100.4.173.223:443
74.75.216.202:443
108.49.221.180:443
31.5.26.171:443
73.23.194.75:443
216.201.162.158:995
72.240.245.253:443
188.192.75.8:995
195.138.42.49:443
71.77.231.251:443
24.43.22.220:443
67.246.16.250:995
81.245.66.237:995
108.39.93.45:443
68.60.221.169:465
151.205.102.42:443
66.26.160.37:443
199.247.16.80:443
71.185.60.227:443
50.244.112.106:443
199.247.22.145:443
72.204.242.138:32100
65.131.83.170:995
200.113.201.83:993
72.204.242.138:6881
77.159.149.74:443
72.204.242.138:32102
66.208.105.6:443
72.16.212.108:465
76.170.77.99:443
47.153.115.154:995
73.30.244.90:443
72.36.59.46:2222
149.71.50.158:443
178.223.17.74:995
49.144.84.21:443
79.119.67.149:443
185.246.9.69:995
94.10.81.239:443
188.192.75.8:443
72.132.21.151:443
84.232.238.30:443
65.24.76.114:443
82.37.242.8:443
78.97.3.6:443
68.200.23.189:443
74.215.201.122:443
73.209.113.58:443
24.27.82.216:2222
78.96.192.26:443
5.13.99.38:995
207.162.184.228:443
97.93.211.17:443
96.56.237.174:993
72.204.242.138:50001
81.103.144.77:443
193.188.121.252:443
104.235.107.100:443
79.115.254.172:443
89.44.192.193:443
92.99.204.211:995
98.32.60.217:443
188.25.173.178:443
117.192.101.152:443
188.241.225.226:2222
36.77.151.211:443
148.75.231.53:443
24.99.180.247:443
140.82.21.191:443
47.138.200.85:443
65.116.179.83:443
173.3.132.17:995
47.153.115.154:443
24.152.219.253:995
207.255.161.8:2222
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exe cryptone -
Executes dropped EXE 3 IoCs
Processes:
ixibiu.exeixibiu.exeixibiu.exepid process 208 ixibiu.exe 2640 ixibiu.exe 184 ixibiu.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
88888888.exeixibiu.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 88888888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 ixibiu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc ixibiu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service ixibiu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 88888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service 88888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 88888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service 88888888.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc ixibiu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service ixibiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 ixibiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 88888888.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 5 IoCs
Processes:
88888888.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 88888888.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 88888888.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 88888888.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 88888888.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 88888888.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
88888888.exe88888888.exeixibiu.exeixibiu.exeexplorer.exe88888888.exeixibiu.exepid process 4048 88888888.exe 4048 88888888.exe 2576 88888888.exe 2576 88888888.exe 2576 88888888.exe 2576 88888888.exe 208 ixibiu.exe 208 ixibiu.exe 2640 ixibiu.exe 2640 ixibiu.exe 2640 ixibiu.exe 2640 ixibiu.exe 1332 explorer.exe 1332 explorer.exe 1332 explorer.exe 1332 explorer.exe 3636 88888888.exe 3636 88888888.exe 184 ixibiu.exe 184 ixibiu.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ixibiu.exepid process 208 ixibiu.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
88888888.exeixibiu.exe88888888.execmd.exedescription pid process target process PID 4048 wrote to memory of 2576 4048 88888888.exe 88888888.exe PID 4048 wrote to memory of 2576 4048 88888888.exe 88888888.exe PID 4048 wrote to memory of 2576 4048 88888888.exe 88888888.exe PID 4048 wrote to memory of 208 4048 88888888.exe ixibiu.exe PID 4048 wrote to memory of 208 4048 88888888.exe ixibiu.exe PID 4048 wrote to memory of 208 4048 88888888.exe ixibiu.exe PID 4048 wrote to memory of 4064 4048 88888888.exe schtasks.exe PID 4048 wrote to memory of 4064 4048 88888888.exe schtasks.exe PID 4048 wrote to memory of 4064 4048 88888888.exe schtasks.exe PID 208 wrote to memory of 2640 208 ixibiu.exe ixibiu.exe PID 208 wrote to memory of 2640 208 ixibiu.exe ixibiu.exe PID 208 wrote to memory of 2640 208 ixibiu.exe ixibiu.exe PID 208 wrote to memory of 1332 208 ixibiu.exe explorer.exe PID 208 wrote to memory of 1332 208 ixibiu.exe explorer.exe PID 208 wrote to memory of 1332 208 ixibiu.exe explorer.exe PID 208 wrote to memory of 1332 208 ixibiu.exe explorer.exe PID 3636 wrote to memory of 2876 3636 88888888.exe reg.exe PID 3636 wrote to memory of 2876 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3836 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3836 3636 88888888.exe reg.exe PID 3636 wrote to memory of 1652 3636 88888888.exe reg.exe PID 3636 wrote to memory of 1652 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3980 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3980 3636 88888888.exe reg.exe PID 3636 wrote to memory of 2884 3636 88888888.exe reg.exe PID 3636 wrote to memory of 2884 3636 88888888.exe reg.exe PID 3636 wrote to memory of 500 3636 88888888.exe reg.exe PID 3636 wrote to memory of 500 3636 88888888.exe reg.exe PID 3636 wrote to memory of 1788 3636 88888888.exe reg.exe PID 3636 wrote to memory of 1788 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3892 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3892 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3164 3636 88888888.exe reg.exe PID 3636 wrote to memory of 3164 3636 88888888.exe reg.exe PID 3636 wrote to memory of 184 3636 88888888.exe ixibiu.exe PID 3636 wrote to memory of 184 3636 88888888.exe ixibiu.exe PID 3636 wrote to memory of 184 3636 88888888.exe ixibiu.exe PID 3636 wrote to memory of 3352 3636 88888888.exe cmd.exe PID 3636 wrote to memory of 3352 3636 88888888.exe cmd.exe PID 3636 wrote to memory of 3568 3636 88888888.exe schtasks.exe PID 3636 wrote to memory of 3568 3636 88888888.exe schtasks.exe PID 3352 wrote to memory of 2868 3352 cmd.exe PING.EXE PID 3352 wrote to memory of 2868 3352 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\88888888.exe"C:\Users\Admin\AppData\Local\Temp\88888888.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\88888888.exeC:\Users\Admin\AppData\Local\Temp\88888888.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ypwovwnuz /tr "\"C:\Users\Admin\AppData\Local\Temp\88888888.exe\" /I ypwovwnuz" /SC ONCE /Z /ST 03:14 /ET 03:262⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\88888888.exeC:\Users\Admin\AppData\Local\Temp\88888888.exe /I ypwovwnuz1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy" /d "0"2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\88888888.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /DELETE /F /TN ypwovwnuz2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.datMD5
6df061d7ff09efac96f908bad209e32e
SHA1e885d475fbb2e871e0c66e01ee752bfe47349d23
SHA256ab0de5cfec34e85e13624434add5625aeb6e0e195374cd905e7849dd3ef47509
SHA5123f6f1346147bbf14328cfd59a0aab8aa8e3ad645cf85cd97388f931a1e78758a836c34424b8daa1e1fc920383dc297da92bba89f4fe29d4d959fdff73f610600
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exeMD5
086a4a65d3ea48a2e4e069ae1002335b
SHA1ae0751887692ce6537f05c37dbe811eaa2f56a75
SHA256f392fec11d15f4c5ca3f5c340c28e99bd19f99d59422b5598fd818be653502bb
SHA5121655b6bd0b9a6047f6ba60fab8c37515b70b2b039129033ad3452cadeb6f4b05bf7b750ba7e39392b53daf4cb145ab9fdee863dc981c5121dafa3564dcb847bc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exeMD5
086a4a65d3ea48a2e4e069ae1002335b
SHA1ae0751887692ce6537f05c37dbe811eaa2f56a75
SHA256f392fec11d15f4c5ca3f5c340c28e99bd19f99d59422b5598fd818be653502bb
SHA5121655b6bd0b9a6047f6ba60fab8c37515b70b2b039129033ad3452cadeb6f4b05bf7b750ba7e39392b53daf4cb145ab9fdee863dc981c5121dafa3564dcb847bc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exeMD5
086a4a65d3ea48a2e4e069ae1002335b
SHA1ae0751887692ce6537f05c37dbe811eaa2f56a75
SHA256f392fec11d15f4c5ca3f5c340c28e99bd19f99d59422b5598fd818be653502bb
SHA5121655b6bd0b9a6047f6ba60fab8c37515b70b2b039129033ad3452cadeb6f4b05bf7b750ba7e39392b53daf4cb145ab9fdee863dc981c5121dafa3564dcb847bc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eunxhmagmugy\ixibiu.exeMD5
086a4a65d3ea48a2e4e069ae1002335b
SHA1ae0751887692ce6537f05c37dbe811eaa2f56a75
SHA256f392fec11d15f4c5ca3f5c340c28e99bd19f99d59422b5598fd818be653502bb
SHA5121655b6bd0b9a6047f6ba60fab8c37515b70b2b039129033ad3452cadeb6f4b05bf7b750ba7e39392b53daf4cb145ab9fdee863dc981c5121dafa3564dcb847bc
-
memory/184-21-0x0000000000000000-mapping.dmp
-
memory/208-9-0x00000000026E0000-0x000000000271A000-memory.dmpFilesize
232KB
-
memory/208-2-0x0000000000000000-mapping.dmp
-
memory/500-17-0x0000000000000000-mapping.dmp
-
memory/1332-10-0x0000000000000000-mapping.dmp
-
memory/1652-14-0x0000000000000000-mapping.dmp
-
memory/1788-18-0x0000000000000000-mapping.dmp
-
memory/2576-0-0x0000000000000000-mapping.dmp
-
memory/2576-1-0x00000000026E0000-0x00000000026E1000-memory.dmpFilesize
4KB
-
memory/2640-6-0x0000000000000000-mapping.dmp
-
memory/2640-8-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/2868-25-0x0000000000000000-mapping.dmp
-
memory/2876-12-0x0000000000000000-mapping.dmp
-
memory/2884-16-0x0000000000000000-mapping.dmp
-
memory/3164-20-0x0000000000000000-mapping.dmp
-
memory/3352-23-0x0000000000000000-mapping.dmp
-
memory/3568-24-0x0000000000000000-mapping.dmp
-
memory/3836-13-0x0000000000000000-mapping.dmp
-
memory/3892-19-0x0000000000000000-mapping.dmp
-
memory/3980-15-0x0000000000000000-mapping.dmp
-
memory/4064-5-0x0000000000000000-mapping.dmp