Analysis
-
max time kernel
12s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-05-2021 22:24
Behavioral task
behavioral1
Sample
1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe
Resource
win7v20210408
General
-
Target
1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe
-
Size
2.3MB
-
MD5
5456ec2fa2f4a0c63df8111e41cf3462
-
SHA1
d9784a94b622e7d481f2787605ca3c569eb73b31
-
SHA256
1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74
-
SHA512
ab6b22e74a51b747ab93192e6af985c025b03be3283e49a676d76ddc6fd17d5ed079707744627a1954c46ab2d4e0fc9355750c6f437c0016be296d99662ae801
Malware Config
Extracted
qakbot
324.127
spx96
1586873043
72.209.191.27:443
173.22.120.11:2222
108.227.161.27:995
172.87.134.226:443
181.197.195.138:995
98.21.52.194:443
76.180.69.236:443
68.98.142.248:443
68.52.164.175:443
39.59.63.142:995
35.142.126.181:443
96.35.170.82:2222
75.111.145.5:443
47.214.144.253:443
74.105.139.160:443
67.8.103.21:443
50.108.212.180:443
83.25.7.201:2222
188.25.237.208:443
184.167.2.251:2222
75.110.250.89:443
84.232.216.243:443
188.27.17.115:443
93.113.91.129:443
71.74.12.34:443
71.182.142.63:443
86.189.181.83:443
72.190.124.29:443
70.183.127.6:995
98.121.187.78:443
97.81.255.189:443
93.114.89.119:995
98.190.24.81:443
68.224.192.39:443
50.244.112.106:443
5.182.39.156:443
97.96.51.117:443
67.209.195.198:3389
181.126.86.223:443
47.146.169.85:443
2.190.144.230:443
67.131.59.17:443
71.11.209.101:443
72.218.167.183:995
66.26.160.37:443
94.52.160.218:443
173.3.132.17:995
66.225.65.155:32101
24.229.245.124:995
100.38.123.22:443
47.205.231.60:443
72.16.212.107:465
100.40.48.96:443
65.131.79.162:995
24.202.42.48:2222
73.169.47.57:443
24.37.178.158:995
108.54.103.234:443
68.116.183.68:443
151.205.102.42:443
66.208.105.6:443
80.11.10.151:990
73.226.220.56:443
75.182.220.196:2222
96.232.203.15:443
69.206.6.71:2222
188.27.67.221:443
70.62.160.186:6883
47.41.3.40:443
49.191.9.180:995
65.116.179.83:443
71.172.110.236:443
47.153.115.154:443
24.158.103.220:443
71.220.222.169:443
108.27.217.44:443
98.197.254.40:443
64.19.74.29:995
71.58.21.235:443
89.34.231.30:443
24.37.178.158:443
70.174.3.241:443
76.170.77.99:443
72.224.213.98:2222
47.136.224.60:443
68.174.15.223:443
72.29.181.77:2078
50.29.181.193:995
69.92.54.95:995
47.180.66.10:443
79.117.9.144:443
184.180.157.203:2222
80.14.209.42:2222
189.163.185.56:443
184.57.17.74:443
98.244.249.165:995
94.52.151.23:443
137.99.224.198:443
120.147.67.62:2222
67.250.184.157:443
206.169.163.147:995
201.146.122.138:443
24.46.40.189:2222
108.34.131.96:443
94.53.113.91:443
50.91.171.137:443
100.1.239.189:443
86.106.126.31:443
86.120.98.221:443
62.121.78.22:443
74.33.70.30:443
78.97.119.189:443
63.230.2.205:2083
79.118.168.203:443
31.5.189.71:443
104.235.60.13:443
173.175.29.210:443
84.117.30.222:443
86.123.130.104:443
81.103.144.77:443
82.210.154.111:443
95.77.237.115:443
121.139.184.226:443
35.143.248.234:443
72.80.137.215:443
98.11.113.199:443
206.183.190.53:995
216.16.178.115:443
79.113.193.29:443
207.255.18.67:443
46.153.95.116:995
71.77.231.251:443
72.36.59.46:2222
188.173.185.139:443
95.77.223.148:443
50.247.230.33:995
89.43.136.239:443
84.247.55.190:443
23.240.76.67:443
98.243.187.85:443
5.14.253.163:443
152.32.80.37:443
79.115.211.4:2222
47.40.244.237:443
67.197.97.144:443
193.23.5.134:443
72.183.129.56:443
85.204.189.105:443
71.77.252.14:2222
95.77.144.238:443
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exepid process 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 768 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 768 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 768 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 768 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.execmd.exedescription pid process target process PID 4056 wrote to memory of 768 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe PID 4056 wrote to memory of 768 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe PID 4056 wrote to memory of 768 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe PID 4056 wrote to memory of 2744 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe cmd.exe PID 4056 wrote to memory of 2744 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe cmd.exe PID 4056 wrote to memory of 2744 4056 1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe cmd.exe PID 2744 wrote to memory of 360 2744 cmd.exe PING.EXE PID 2744 wrote to memory of 360 2744 cmd.exe PING.EXE PID 2744 wrote to memory of 360 2744 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe"C:\Users\Admin\AppData\Local\Temp\1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exeC:\Users\Admin\AppData\Local\Temp\1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\1442744d1980ad214b64c152b482c9f82e869cb4540495df5bb2248de0cbad74.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
PID:360
-
-