Analysis
-
max time kernel
149s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 03:38
Static task
static1
Behavioral task
behavioral1
Sample
DEBT_07854_06162020.vbs
Resource
win7-20220414-en
General
-
Target
DEBT_07854_06162020.vbs
-
Size
2.6MB
-
MD5
66222018f11f64892cf65efeaade4e51
-
SHA1
c9a4282e5ba84aaeb136bf47b8ae04185f32af86
-
SHA256
116905c43d121cc4e1fdaa9ef2e89bb2f83a4c89b5fb400024f94c5cb06b9b09
-
SHA512
1b1fe70395a322e8e7450e881cda37a58ff614146f1f7e66346b4e13bddad66c1a1f7b5f3f7c2aa81e6e58d1379fe9f00eb1f481250fba4af2c6015814e18980
Malware Config
Extracted
qakbot
324.142
spx142
1592381263
173.175.29.210:443
201.248.102.4:2078
182.185.94.24:995
41.97.182.19:443
37.182.238.170:2222
193.248.44.2:2222
188.26.243.186:443
84.247.55.190:443
58.233.220.182:443
82.79.67.68:443
217.162.149.212:443
173.49.122.160:995
117.216.177.27:443
219.92.104.54:443
5.107.220.84:2222
96.41.93.96:443
122.147.204.4:443
117.199.5.99:443
68.60.221.169:465
78.96.192.26:443
78.96.190.54:443
69.11.247.242:443
207.255.161.8:32100
68.204.164.222:443
82.81.172.21:443
78.97.145.242:443
216.163.4.132:443
68.190.152.98:443
73.217.4.42:443
76.116.90.159:443
75.110.250.89:443
35.142.12.163:2222
74.134.46.7:443
80.195.103.146:2222
41.34.91.90:995
39.62.15.131:443
70.93.151.141:443
81.245.66.237:995
86.144.150.29:2222
172.242.243.186:443
59.88.168.3:443
73.200.219.143:443
35.143.205.199:443
24.42.14.241:995
98.121.187.78:443
73.78.149.206:443
81.133.234.36:2222
154.56.71.73:443
188.241.243.175:443
77.69.206.106:443
207.255.161.8:32102
69.92.54.95:995
83.110.222.11:443
108.227.161.27:995
74.222.204.82:443
74.135.37.79:443
187.155.74.5:443
80.14.209.42:2222
24.44.180.236:2222
74.75.216.202:443
24.43.22.220:993
108.188.116.179:443
100.4.173.223:443
70.95.118.217:443
134.0.196.46:995
68.225.56.31:443
140.82.21.191:443
110.142.29.212:443
72.36.59.46:2222
207.162.184.228:443
59.26.204.210:443
108.39.93.45:443
97.93.211.17:443
24.122.228.88:443
72.132.249.144:995
72.16.212.108:465
47.153.115.154:993
47.153.115.154:443
66.222.88.126:995
72.204.242.138:53
203.198.96.69:443
72.29.181.77:2078
67.83.54.76:2222
2.50.171.142:443
24.122.157.93:443
47.146.169.85:443
174.34.67.106:2222
122.147.204.4:995
82.77.169.118:2222
178.221.64.104:995
77.237.181.168:995
86.126.97.183:2222
76.111.128.194:443
67.209.195.198:3389
72.190.101.70:443
74.56.167.31:443
24.42.14.241:443
5.193.61.212:2222
5.15.81.52:443
24.201.79.208:2078
94.52.160.116:443
188.192.75.8:995
208.82.44.203:443
207.255.161.8:443
67.170.137.8:443
62.38.111.70:2222
24.164.79.147:443
70.183.127.6:995
185.246.9.69:995
67.165.206.193:995
50.104.68.223:443
211.24.72.253:443
184.180.157.203:2222
173.245.152.231:443
95.77.223.148:443
68.4.137.211:443
71.88.168.176:443
5.13.68.129:443
199.250.149.110:443
47.153.115.154:465
98.115.138.61:443
79.117.243.157:443
201.215.29.153:443
189.231.198.212:443
188.27.6.170:443
24.43.22.220:995
92.17.167.87:2222
24.43.22.220:443
72.209.191.27:443
72.204.242.138:80
78.101.142.240:443
72.204.242.138:443
71.187.170.235:443
96.56.237.174:32103
71.187.7.239:443
184.98.104.7:995
137.99.224.198:443
151.205.102.42:443
98.32.60.217:443
64.224.76.152:443
72.204.242.138:32100
76.170.77.99:443
70.174.3.241:443
96.37.137.42:443
47.153.115.154:995
203.33.138.230:443
175.141.238.131:443
36.77.151.211:443
78.101.133.124:443
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Churchill.exe cryptone \Users\Admin\AppData\Local\Temp\Churchill.exe cryptone C:\Users\Admin\AppData\Local\Temp\Churchill.exe cryptone C:\Users\Admin\AppData\Local\Temp\Churchill.exe cryptone \Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exe cryptone \Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exe cryptone -
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 2 1480 WScript.exe 3 1480 WScript.exe -
Executes dropped EXE 4 IoCs
Processes:
Churchill.exeChurchill.exevwjly.exevwjly.exepid process 1716 Churchill.exe 520 Churchill.exe 428 vwjly.exe 1164 vwjly.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 1480 WScript.exe -
Loads dropped DLL 3 IoCs
Processes:
Churchill.exepid process 1716 Churchill.exe 1716 Churchill.exe 1716 Churchill.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Churchill.exeChurchill.exevwjly.exevwjly.exeexplorer.exepid process 1716 Churchill.exe 520 Churchill.exe 520 Churchill.exe 428 vwjly.exe 1164 vwjly.exe 1164 vwjly.exe 1916 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
vwjly.exepid process 428 vwjly.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WScript.exepid process 1480 WScript.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Churchill.exevwjly.exedescription pid process target process PID 1716 wrote to memory of 520 1716 Churchill.exe Churchill.exe PID 1716 wrote to memory of 520 1716 Churchill.exe Churchill.exe PID 1716 wrote to memory of 520 1716 Churchill.exe Churchill.exe PID 1716 wrote to memory of 520 1716 Churchill.exe Churchill.exe PID 1716 wrote to memory of 428 1716 Churchill.exe vwjly.exe PID 1716 wrote to memory of 428 1716 Churchill.exe vwjly.exe PID 1716 wrote to memory of 428 1716 Churchill.exe vwjly.exe PID 1716 wrote to memory of 428 1716 Churchill.exe vwjly.exe PID 1716 wrote to memory of 1096 1716 Churchill.exe schtasks.exe PID 1716 wrote to memory of 1096 1716 Churchill.exe schtasks.exe PID 1716 wrote to memory of 1096 1716 Churchill.exe schtasks.exe PID 1716 wrote to memory of 1096 1716 Churchill.exe schtasks.exe PID 428 wrote to memory of 1164 428 vwjly.exe vwjly.exe PID 428 wrote to memory of 1164 428 vwjly.exe vwjly.exe PID 428 wrote to memory of 1164 428 vwjly.exe vwjly.exe PID 428 wrote to memory of 1164 428 vwjly.exe vwjly.exe PID 428 wrote to memory of 1916 428 vwjly.exe explorer.exe PID 428 wrote to memory of 1916 428 vwjly.exe explorer.exe PID 428 wrote to memory of 1916 428 vwjly.exe explorer.exe PID 428 wrote to memory of 1916 428 vwjly.exe explorer.exe PID 428 wrote to memory of 1916 428 vwjly.exe explorer.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\DEBT_07854_06162020.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Deletes itself
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeC:\Users\Admin\AppData\Local\Temp\Churchill.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeC:\Users\Admin\AppData\Local\Temp\Churchill.exe /C2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exeC:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exeC:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exe /C3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ifcdalrb /tr "\"C:\Users\Admin\AppData\Local\Temp\Churchill.exe\" /I ifcdalrb" /SC ONCE /Z /ST 07:25 /ET 07:372⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
\Users\Admin\AppData\Roaming\Microsoft\Isypdwvcrk\vwjly.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
memory/428-66-0x0000000000000000-mapping.dmp
-
memory/428-70-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/520-60-0x0000000000000000-mapping.dmp
-
memory/520-63-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/1096-68-0x0000000000000000-mapping.dmp
-
memory/1164-72-0x0000000000000000-mapping.dmp
-
memory/1164-75-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/1716-56-0x00000000003A0000-0x00000000003D7000-memory.dmpFilesize
220KB
-
memory/1716-55-0x0000000075871000-0x0000000075873000-memory.dmpFilesize
8KB
-
memory/1716-57-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/1916-76-0x0000000000000000-mapping.dmp
-
memory/1916-78-0x0000000074641000-0x0000000074643000-memory.dmpFilesize
8KB
-
memory/1916-79-0x0000000000080000-0x00000000000BA000-memory.dmpFilesize
232KB
-
memory/1916-80-0x0000000000200000-0x0000000000233000-memory.dmpFilesize
204KB