Analysis
-
max time kernel
81s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe
Resource
win7-20220715-en
General
-
Target
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe
-
Size
520KB
-
MD5
534394261be4f63a4b59501be880ee5d
-
SHA1
2909b52711253adf9e475a0f4ba487402f634298
-
SHA256
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f
-
SHA512
75b86c62eae4b76ec42c749805a9c27e10c78ff8332509b81688c34b5e1fa1fcb9174121415398595eb7aa60d8d9aab361dbd43f978c807dc433f485bd20b57b
Malware Config
Extracted
qakbot
322.742
hhh23
1554720361
Protocol: ftp- Host:
192.185.5.208 - Port:
21 - Username:
[email protected] - Password:
NxdkxAp4dUsY
Protocol: ftp- Host:
162.241.218.118 - Port:
21 - Username:
[email protected] - Password:
EcOV0DyGVgVN
Protocol: ftp- Host:
69.89.31.139 - Port:
21 - Username:
[email protected] - Password:
fcR7OvyLrMW6!
Protocol: ftp- Host:
169.207.67.14 - Port:
21 - Username:
[email protected] - Password:
eQyicNLzzqPN
184.186.76.228:80
65.153.32.170:443
65.116.179.83:443
100.16.222.65:443
148.240.66.99:6881
172.78.85.124:443
71.210.140.93:995
72.29.181.77:2078
162.237.221.101:443
70.105.162.74:995
192.198.85.26:443
24.73.69.42:443
190.120.196.18:995
67.202.178.142:443
208.69.72.135:2222
69.159.223.202:443
174.48.72.160:443
75.183.171.155:3389
81.103.144.77:443
76.27.113.181:995
70.178.153.24:2222
109.116.196.199:443
104.3.91.20:995
2.50.156.213:443
216.221.73.45:993
184.180.157.203:2222
71.205.168.236:443
67.214.201.117:2222
174.89.98.161:2222
78.94.55.26:50003
173.168.105.213:443
70.183.154.153:995
72.47.152.29:443
131.104.110.9:443
70.28.22.105:2222
209.137.209.84:443
74.196.77.243:443
68.147.26.96:443
47.152.160.207:443
187.212.142.249:443
70.119.159.214:443
186.70.35.99:50000
75.88.100.186:995
96.20.46.60:995
187.163.143.13:443
66.76.46.84:3389
174.197.19.131:2222
23.228.141.142:2222
66.171.24.252:443
174.90.109.177:2222
73.150.217.2:443
70.109.254.170:995
173.20.116.156:443
96.20.238.2:2222
190.120.196.18:443
184.161.177.223:2222
216.221.73.45:2222
68.58.134.41:443
50.101.235.89:443
45.78.186.166:443
70.80.118.138:443
47.214.144.253:443
70.53.99.56:32101
108.189.186.188:20
68.238.144.55:443
41.202.79.201:993
166.78.243.43:443
68.184.225.247:443
73.23.233.225:443
65.184.83.199:2222
50.247.230.33:443
50.192.222.65:443
67.197.140.192:443
173.79.220.2:443
24.138.169.247:443
199.126.92.231:443
96.20.84.208:443
204.11.43.122:443
181.143.141.226:995
187.195.164.22:443
189.159.27.63:443
24.173.61.30:443
103.9.226.57:2222
185.219.83.73:0
181.119.30.39:443
192.186.96.125:443
73.136.27.210:995
72.132.247.194:443
71.93.60.90:443
75.132.11.205:443
66.222.88.126:995
74.115.246.21:995
47.155.17.65:995
65.75.94.213:2222
61.175.155.204:995
50.125.73.88:443
74.139.37.244:2222
72.201.251.84:2222
71.197.126.250:443
47.133.131.21:995
198.251.117.140:443
76.66.124.54:8443
104.163.182.94:443
198.48.233.21:995
73.212.211.247:443
66.130.129.10:2222
73.55.10.195:443
98.151.133.2:995
190.120.196.18:1194
192.226.157.108:993
69.202.163.99:443
41.36.182.103:995
71.11.52.5:2222
186.30.82.87:2222
179.8.42.129:443
76.65.136.166:2222
70.188.169.168:443
104.173.33.43:443
65.92.170.181:2222
178.86.247.42:443
70.24.76.156:2222
70.83.241.218:2222
181.25.188.132:995
104.193.102.52:443
76.94.172.250:443
184.66.247.59:443
73.60.143.140:443
74.68.50.163:443
103.12.169.171:443
137.175.232.150:2222
67.171.30.99:995
173.173.167.129:443
108.49.108.127:443
97.94.72.177:443
181.119.30.28:443
73.231.9.169:443
192.100.72.2:2222
76.93.183.98:443
71.61.49.50:443
75.88.100.186:993
187.135.157.102:443
73.138.194.145:2222
67.161.42.189:443
187.233.52.47:443
189.135.135.185:443
108.51.109.34:995
96.29.219.77:443
24.131.82.168:443
189.155.86.9:443
200.76.97.75:2222
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exef05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exepid process 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe 1944 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe 1944 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe 1944 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe 1944 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.execmd.exedescription pid process target process PID 3528 wrote to memory of 1944 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe PID 3528 wrote to memory of 1944 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe PID 3528 wrote to memory of 1944 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe PID 3528 wrote to memory of 1720 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe cmd.exe PID 3528 wrote to memory of 1720 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe cmd.exe PID 3528 wrote to memory of 1720 3528 f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe cmd.exe PID 1720 wrote to memory of 2236 1720 cmd.exe PING.EXE PID 1720 wrote to memory of 2236 1720 cmd.exe PING.EXE PID 1720 wrote to memory of 2236 1720 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe"C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exeC:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\f05334fea2fbec8b2135752dc8f895f0290377d937cae28a10adc3eebe71cf0f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
PID:2236
-
-