Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-03-2022 03:10
Static task
static1
General
-
Target
f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe
-
Size
232KB
-
MD5
89545aa0c4f25bf6505a6b16de5721c4
-
SHA1
f1dc7554e9776d7c724ad22b3251fd552d46e098
-
SHA256
f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8
-
SHA512
f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
qbllv.exerpna.exebuouca.exepid process 2060 qbllv.exe 1672 rpna.exe 4584 buouca.exe -
Drops file in Windows directory 5 IoCs
Processes:
f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exeqbllv.exerpna.exedescription ioc process File created C:\Windows\Tasks\qbllv.job f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe File opened for modification C:\Windows\Tasks\qbllv.job f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe File created C:\Windows\Tasks\qlqdmbgrhqmvpaufwkd.job qbllv.exe File created C:\Windows\Tasks\buouca.job rpna.exe File opened for modification C:\Windows\Tasks\buouca.job rpna.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3620 4696 WerFault.exe f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exerpna.exepid process 4696 f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe 4696 f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe 1672 rpna.exe 1672 rpna.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe"C:\Users\Admin\AppData\Local\Temp\f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 4882⤵
- Program crash
PID:3620
-
C:\ProgramData\jcag\qbllv.exeC:\ProgramData\jcag\qbllv.exe start1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4696 -ip 46961⤵PID:4856
-
C:\Windows\TEMP\rpna.exeC:\Windows\TEMP\rpna.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
C:\ProgramData\bonvej\buouca.exeC:\ProgramData\bonvej\buouca.exe start1⤵
- Executes dropped EXE
PID:4584
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\bonvej\buouca.exeMD5
89545aa0c4f25bf6505a6b16de5721c4
SHA1f1dc7554e9776d7c724ad22b3251fd552d46e098
SHA256f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8
SHA512f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b
-
C:\ProgramData\bonvej\buouca.exeMD5
89545aa0c4f25bf6505a6b16de5721c4
SHA1f1dc7554e9776d7c724ad22b3251fd552d46e098
SHA256f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8
SHA512f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b
-
C:\ProgramData\jcag\qbllv.exeMD5
89545aa0c4f25bf6505a6b16de5721c4
SHA1f1dc7554e9776d7c724ad22b3251fd552d46e098
SHA256f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8
SHA512f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b
-
C:\ProgramData\jcag\qbllv.exeMD5
89545aa0c4f25bf6505a6b16de5721c4
SHA1f1dc7554e9776d7c724ad22b3251fd552d46e098
SHA256f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8
SHA512f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b
-
C:\Windows\TEMP\rpna.exeMD5
89545aa0c4f25bf6505a6b16de5721c4
SHA1f1dc7554e9776d7c724ad22b3251fd552d46e098
SHA256f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8
SHA512f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b
-
C:\Windows\Tasks\qbllv.jobMD5
1454a6c37731bc21edf538c528b6474b
SHA13623a3f33747ece1b55738d8d6c1a9c60b79728c
SHA256dce089653118f2f80be54b390e674fa18016c6338bdb2a74e0a63497b9935b49
SHA5127fc76b01dbf4e435c8b0c7fbbfc1034d2de0a75f9dc32cfd1980fc1053e919c9af9f40b6710b6f9eb3311b16386156ee050b62372043459d6f98810341b6c775
-
C:\Windows\Temp\rpna.exeMD5
89545aa0c4f25bf6505a6b16de5721c4
SHA1f1dc7554e9776d7c724ad22b3251fd552d46e098
SHA256f8f47008cedcad207b82e37c86c9fb6656942374eb5a7636caf301ac425bc9f8
SHA512f7cae7089a54a1600c2bcb4a929a13f8a2f81af1845ab24943361511dc941252bd7aa954617063a1ec1ac99a83293b20773e69b3cb8cd9722e84a9b5728a599b
-
memory/1672-148-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/1672-147-0x00000000006AD000-0x00000000006B6000-memory.dmpFilesize
36KB
-
memory/1672-145-0x00000000006AD000-0x00000000006B6000-memory.dmpFilesize
36KB
-
memory/2060-142-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/2060-141-0x00000000004AD000-0x00000000004B6000-memory.dmpFilesize
36KB
-
memory/2060-140-0x00000000004AD000-0x00000000004B6000-memory.dmpFilesize
36KB
-
memory/4584-151-0x000000000084D000-0x0000000000856000-memory.dmpFilesize
36KB
-
memory/4584-152-0x000000000084D000-0x0000000000856000-memory.dmpFilesize
36KB
-
memory/4584-153-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/4696-137-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/4696-134-0x0000000000671000-0x000000000067A000-memory.dmpFilesize
36KB
-
memory/4696-136-0x0000000000600000-0x0000000000609000-memory.dmpFilesize
36KB
-
memory/4696-135-0x0000000000671000-0x000000000067A000-memory.dmpFilesize
36KB