Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 08:29
Behavioral task
behavioral1
Sample
ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe
Resource
win10v2004-en-20220113
General
-
Target
ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe
-
Size
2.1MB
-
MD5
07a3d29ab1bcf1de8cdcfd646f64fe96
-
SHA1
2b5f6bc4f30a7819c5c391938cee7615b32f3240
-
SHA256
ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7
-
SHA512
b35801531bd27138d368504002d30687cde5ba7f57675fbdf080f549c3c40d78f9e5187efcd2324415ed066caca97893d83c8fe4df651f8cc6987fc7823d6563
Malware Config
Extracted
qakbot
324.75
spx90
1586180537
79.113.218.134:443
71.77.231.251:443
89.43.136.239:443
72.36.59.46:2222
76.30.66.244:443
73.163.242.114:443
173.216.174.39:443
70.95.94.91:2078
208.126.142.17:443
216.152.7.12:443
172.87.134.226:443
71.58.21.235:443
173.62.161.126:443
184.21.151.81:995
208.93.202.49:443
206.183.190.53:995
69.123.179.70:443
63.155.135.211:995
72.209.191.27:443
73.184.218.146:443
98.197.254.40:443
181.197.195.138:995
71.195.111.107:443
213.31.203.38:2222
188.27.17.115:443
69.206.6.71:2222
98.11.109.156:443
24.55.152.50:995
24.158.103.220:443
187.212.154.43:443
120.147.65.97:2222
188.25.237.208:443
72.231.224.122:2222
86.106.126.189:443
97.127.144.203:2222
5.13.40.48:995
206.255.163.120:443
66.222.88.126:995
71.178.38.101:443
75.110.93.212:443
75.111.145.5:443
78.97.145.242:443
216.137.142.200:2222
74.105.139.160:443
189.140.74.166:443
83.25.10.201:2222
95.77.237.115:443
68.116.183.68:443
108.27.217.44:443
71.77.252.14:2222
152.32.80.37:443
47.153.115.154:993
86.123.10.92:443
71.182.142.63:443
76.180.69.236:443
209.182.121.133:2222
5.182.39.156:443
67.131.59.17:443
72.142.106.198:465
67.250.184.157:443
78.96.245.58:443
216.201.162.158:443
24.110.96.149:443
86.189.181.83:443
71.187.170.235:443
108.39.114.84:993
75.130.117.134:443
31.5.26.171:443
75.110.250.89:443
24.184.5.251:2222
188.173.185.139:443
71.11.209.101:443
173.22.120.11:2222
24.46.40.189:2222
70.57.15.187:993
188.26.249.148:443
72.190.124.29:443
89.165.170.125:443
23.24.115.181:443
72.16.212.107:465
173.3.132.17:995
24.229.245.124:995
47.205.231.60:443
68.46.142.48:995
85.7.22.186:2222
86.121.147.124:443
96.35.170.82:2222
71.213.61.215:995
108.54.103.234:443
24.202.42.48:2222
72.80.137.215:443
70.74.159.126:2222
47.24.47.218:443
151.205.102.42:443
174.125.9.113:443
69.92.54.95:995
98.219.77.197:443
69.254.141.249:443
74.33.70.30:443
68.98.142.248:443
72.38.44.119:995
47.153.115.154:995
49.191.9.180:995
80.14.209.42:2222
47.153.115.154:443
100.33.132.135:443
65.131.79.162:995
81.133.234.36:2222
100.38.123.22:443
79.114.240.243:995
86.99.55.241:443
172.95.42.35:443
24.61.47.73:443
5.13.126.243:443
68.174.9.179:443
187.163.101.137:995
73.214.231.2:443
50.29.181.193:995
68.49.120.179:443
68.224.192.39:443
87.65.204.240:995
79.113.215.65:443
187.19.151.218:995
78.96.148.177:443
86.123.95.59:2222
68.61.163.191:443
186.135.13.215:443
108.49.221.180:443
73.137.187.150:443
193.23.5.134:443
207.5.138.66:0
74.135.85.117:443
64.121.69.241:443
70.124.29.226:443
68.174.15.223:443
64.19.74.29:995
24.37.178.158:443
68.39.177.147:995
65.96.36.157:443
209.137.209.163:995
98.199.226.41:443
75.89.199.86:443
96.41.93.96:443
206.169.163.147:995
73.226.220.56:443
98.190.24.81:443
79.113.247.190:443
173.173.68.41:443
77.159.149.74:443
84.117.115.162:443
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exeea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exepid process 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe 1276 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe 1276 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.execmd.exedescription pid process target process PID 852 wrote to memory of 1276 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe PID 852 wrote to memory of 1276 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe PID 852 wrote to memory of 1276 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe PID 852 wrote to memory of 1276 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe PID 852 wrote to memory of 1736 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe cmd.exe PID 852 wrote to memory of 1736 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe cmd.exe PID 852 wrote to memory of 1736 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe cmd.exe PID 852 wrote to memory of 1736 852 ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe cmd.exe PID 1736 wrote to memory of 1652 1736 cmd.exe PING.EXE PID 1736 wrote to memory of 1652 1736 cmd.exe PING.EXE PID 1736 wrote to memory of 1652 1736 cmd.exe PING.EXE PID 1736 wrote to memory of 1652 1736 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe"C:\Users\Admin\AppData\Local\Temp\ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exeC:\Users\Admin\AppData\Local\Temp\ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\ea4dcaac0b61ec7f40c3695c285e799aacefd8c825e8b119e64a268af7d7c4c7.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/852-54-0x0000000075761000-0x0000000075763000-memory.dmpFilesize
8KB
-
memory/852-55-0x0000000000220000-0x0000000000259000-memory.dmpFilesize
228KB
-
memory/852-57-0x0000000000400000-0x0000000000613000-memory.dmpFilesize
2.1MB
-
memory/1276-58-0x0000000000400000-0x0000000000613000-memory.dmpFilesize
2.1MB