Analysis
-
max time kernel
54s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe
Resource
win7-20220715-en
General
-
Target
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe
-
Size
520KB
-
MD5
534394261be4f63a4b59501be880ee5d
-
SHA1
2909b52711253adf9e475a0f4ba487402f634298
-
SHA256
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f
-
SHA512
75b86c62eae4b76ec42c749805a9c27e10c78ff8332509b81688c34b5e1fa1fcb9174121415398595eb7aa60d8d9aab361dbd43f978c807dc433f485bd20b57b
Malware Config
Extracted
qakbot
322.742
hhh23
1554720361
Protocol: ftp- Host:
192.185.5.208 - Port:
21 - Username:
[email protected] - Password:
NxdkxAp4dUsY
Protocol: ftp- Host:
162.241.218.118 - Port:
21 - Username:
[email protected] - Password:
EcOV0DyGVgVN
Protocol: ftp- Host:
69.89.31.139 - Port:
21 - Username:
[email protected] - Password:
fcR7OvyLrMW6!
Protocol: ftp- Host:
169.207.67.14 - Port:
21 - Username:
[email protected] - Password:
eQyicNLzzqPN
184.186.76.228:80
65.153.32.170:443
65.116.179.83:443
100.16.222.65:443
148.240.66.99:6881
172.78.85.124:443
71.210.140.93:995
72.29.181.77:2078
162.237.221.101:443
70.105.162.74:995
192.198.85.26:443
24.73.69.42:443
190.120.196.18:995
67.202.178.142:443
208.69.72.135:2222
69.159.223.202:443
174.48.72.160:443
75.183.171.155:3389
81.103.144.77:443
76.27.113.181:995
70.178.153.24:2222
109.116.196.199:443
104.3.91.20:995
2.50.156.213:443
216.221.73.45:993
184.180.157.203:2222
71.205.168.236:443
67.214.201.117:2222
174.89.98.161:2222
78.94.55.26:50003
173.168.105.213:443
70.183.154.153:995
72.47.152.29:443
131.104.110.9:443
70.28.22.105:2222
209.137.209.84:443
74.196.77.243:443
68.147.26.96:443
47.152.160.207:443
187.212.142.249:443
70.119.159.214:443
186.70.35.99:50000
75.88.100.186:995
96.20.46.60:995
187.163.143.13:443
66.76.46.84:3389
174.197.19.131:2222
23.228.141.142:2222
66.171.24.252:443
174.90.109.177:2222
73.150.217.2:443
70.109.254.170:995
173.20.116.156:443
96.20.238.2:2222
190.120.196.18:443
184.161.177.223:2222
216.221.73.45:2222
68.58.134.41:443
50.101.235.89:443
45.78.186.166:443
70.80.118.138:443
47.214.144.253:443
70.53.99.56:32101
108.189.186.188:20
68.238.144.55:443
41.202.79.201:993
166.78.243.43:443
68.184.225.247:443
73.23.233.225:443
65.184.83.199:2222
50.247.230.33:443
50.192.222.65:443
67.197.140.192:443
173.79.220.2:443
24.138.169.247:443
199.126.92.231:443
96.20.84.208:443
204.11.43.122:443
181.143.141.226:995
187.195.164.22:443
189.159.27.63:443
24.173.61.30:443
103.9.226.57:2222
185.219.83.73:0
181.119.30.39:443
192.186.96.125:443
73.136.27.210:995
72.132.247.194:443
71.93.60.90:443
75.132.11.205:443
66.222.88.126:995
74.115.246.21:995
47.155.17.65:995
65.75.94.213:2222
61.175.155.204:995
50.125.73.88:443
74.139.37.244:2222
72.201.251.84:2222
71.197.126.250:443
47.133.131.21:995
198.251.117.140:443
76.66.124.54:8443
104.163.182.94:443
198.48.233.21:995
73.212.211.247:443
66.130.129.10:2222
73.55.10.195:443
98.151.133.2:995
190.120.196.18:1194
192.226.157.108:993
69.202.163.99:443
41.36.182.103:995
71.11.52.5:2222
186.30.82.87:2222
179.8.42.129:443
76.65.136.166:2222
70.188.169.168:443
104.173.33.43:443
65.92.170.181:2222
178.86.247.42:443
70.24.76.156:2222
70.83.241.218:2222
181.25.188.132:995
104.193.102.52:443
76.94.172.250:443
184.66.247.59:443
73.60.143.140:443
74.68.50.163:443
103.12.169.171:443
137.175.232.150:2222
67.171.30.99:995
173.173.167.129:443
108.49.108.127:443
97.94.72.177:443
181.119.30.28:443
73.231.9.169:443
192.100.72.2:2222
76.93.183.98:443
71.61.49.50:443
75.88.100.186:993
187.135.157.102:443
73.138.194.145:2222
67.161.42.189:443
187.233.52.47:443
189.135.135.185:443
108.51.109.34:995
96.29.219.77:443
24.131.82.168:443
189.155.86.9:443
200.76.97.75:2222
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exef05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exepid process 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe 2004 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe 2004 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.execmd.exedescription pid process target process PID 1972 wrote to memory of 2004 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe PID 1972 wrote to memory of 2004 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe PID 1972 wrote to memory of 2004 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe PID 1972 wrote to memory of 2004 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe PID 1972 wrote to memory of 1380 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe cmd.exe PID 1972 wrote to memory of 1380 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe cmd.exe PID 1972 wrote to memory of 1380 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe cmd.exe PID 1972 wrote to memory of 1380 1972 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe cmd.exe PID 1380 wrote to memory of 268 1380 cmd.exe PING.EXE PID 1380 wrote to memory of 268 1380 cmd.exe PING.EXE PID 1380 wrote to memory of 268 1380 cmd.exe PING.EXE PID 1380 wrote to memory of 268 1380 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe"C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exeC:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
PID:268
-
-