Analysis
-
max time kernel
166s -
max time network
503s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:03
Static task
static1
Behavioral task
behavioral1
Sample
21.exe
Resource
win7-20220718-en
General
-
Target
21.exe
-
Size
214KB
-
MD5
dd02e9fe9baf3f3ec6a70497a63face1
-
SHA1
a3ca2d93ba6ae5bf652c0e0268734000208e8d65
-
SHA256
0bd6894c52fd77e1e13de3c97cb9b79757c73d1441f2bee852d6af9e954e3b59
-
SHA512
cffe879f3c57cae85049d9836e15ed3e03246b33d88ec332707ec82157f2be4e804625eae8c4c6a2472fe72bc4ed82191e8c5bfb4420e704aca7b3543c164db7
Malware Config
Extracted
qakbot
325.43
tr01
1602688146
73.228.1.246:443
74.109.219.145:443
76.111.128.194:443
90.175.88.99:2222
108.191.28.158:443
68.225.60.77:443
75.136.40.155:443
5.193.181.221:2078
72.204.242.138:20
118.160.162.234:443
68.14.210.246:22
148.101.74.12:443
74.222.204.82:443
96.30.198.161:443
140.82.27.132:443
2.50.131.64:443
45.32.155.12:995
45.63.104.123:443
45.32.165.134:443
217.162.149.212:443
207.246.70.216:443
200.75.136.78:443
187.155.58.60:443
166.62.183.139:2078
35.134.202.234:443
67.170.137.8:443
70.45.126.135:443
173.21.10.71:2222
96.247.181.229:443
76.167.240.21:443
67.165.206.193:993
71.80.66.107:443
81.98.133.106:443
190.63.182.214:443
71.197.126.250:443
71.220.191.200:443
24.71.28.247:443
71.56.53.127:443
24.43.22.220:993
81.133.234.36:2222
69.47.239.10:443
80.195.103.146:2222
78.96.199.79:443
65.131.47.228:995
86.121.121.14:2222
96.243.35.201:443
173.70.165.101:995
80.14.209.42:2222
2.51.221.138:995
76.170.77.99:995
46.53.38.174:443
68.116.193.239:443
187.213.152.50:995
50.244.112.10:995
2.88.42.65:995
69.47.26.41:443
151.73.121.31:443
108.46.145.30:443
71.187.170.235:443
75.136.26.147:443
134.0.196.46:995
98.118.156.172:443
199.116.241.147:443
75.137.239.211:443
103.238.231.35:443
74.75.216.202:443
184.21.136.237:443
71.182.142.63:443
78.97.3.6:443
108.190.151.108:2222
85.121.42.12:995
67.6.55.77:443
141.158.47.123:443
98.240.24.57:443
68.46.142.48:995
151.205.102.42:443
172.87.134.226:443
187.213.186.154:443
72.204.242.138:443
72.240.200.181:2222
72.36.59.46:2222
24.229.150.54:995
100.4.179.64:443
190.85.91.154:443
31.215.98.218:443
47.28.131.209:443
207.255.161.8:993
207.246.75.201:443
77.159.149.74:443
45.77.193.83:443
71.19.217.23:443
86.121.215.99:443
207.255.161.8:995
184.180.157.203:2222
108.35.13.206:443
24.122.0.90:443
67.209.195.198:443
68.190.152.98:443
72.204.242.138:465
65.30.213.13:6882
188.27.178.166:443
207.255.161.8:32103
186.154.182.103:443
72.190.101.70:443
208.99.100.129:443
63.155.8.102:995
178.222.13.77:995
70.123.92.175:2222
108.5.33.110:443
70.168.130.172:995
45.32.154.10:443
199.247.22.145:443
80.240.26.178:443
85.204.189.105:443
102.190.183.108:443
207.255.161.8:443
66.215.32.224:443
71.28.7.23:443
86.176.25.92:2222
61.230.0.156:443
207.255.161.8:32100
41.228.59.195:443
67.60.113.253:2222
117.218.208.239:443
206.183.190.53:993
184.98.103.204:995
134.228.24.29:443
66.97.247.15:443
72.204.242.138:50001
72.204.242.138:32100
66.26.160.37:443
86.98.89.172:2222
72.82.15.220:443
24.37.178.158:443
47.44.217.98:443
72.204.242.138:995
95.179.247.224:443
172.78.30.215:443
39.36.156.196:995
24.234.86.201:995
71.163.222.203:443
72.204.242.138:53
93.149.253.201:2222
108.30.125.94:443
84.247.55.190:443
89.42.142.35:443
98.16.204.189:995
45.32.155.12:2222
72.204.242.138:32102
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
yfpcyfam.exeyfpcyfam.exepid process 404 yfpcyfam.exe 2712 yfpcyfam.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
yfpcyfam.exe21.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 yfpcyfam.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc yfpcyfam.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc 21.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service 21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 yfpcyfam.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc yfpcyfam.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service yfpcyfam.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service yfpcyfam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 21.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 21.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 21.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
21.exe21.exeyfpcyfam.exeyfpcyfam.exeexplorer.exepid process 3360 21.exe 3360 21.exe 1924 21.exe 1924 21.exe 1924 21.exe 1924 21.exe 404 yfpcyfam.exe 404 yfpcyfam.exe 2712 yfpcyfam.exe 2712 yfpcyfam.exe 2712 yfpcyfam.exe 2712 yfpcyfam.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
yfpcyfam.exepid process 404 yfpcyfam.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
21.exeyfpcyfam.exedescription pid process target process PID 3360 wrote to memory of 1924 3360 21.exe 21.exe PID 3360 wrote to memory of 1924 3360 21.exe 21.exe PID 3360 wrote to memory of 1924 3360 21.exe 21.exe PID 3360 wrote to memory of 404 3360 21.exe yfpcyfam.exe PID 3360 wrote to memory of 404 3360 21.exe yfpcyfam.exe PID 3360 wrote to memory of 404 3360 21.exe yfpcyfam.exe PID 3360 wrote to memory of 1276 3360 21.exe schtasks.exe PID 3360 wrote to memory of 1276 3360 21.exe schtasks.exe PID 3360 wrote to memory of 1276 3360 21.exe schtasks.exe PID 404 wrote to memory of 2712 404 yfpcyfam.exe yfpcyfam.exe PID 404 wrote to memory of 2712 404 yfpcyfam.exe yfpcyfam.exe PID 404 wrote to memory of 2712 404 yfpcyfam.exe yfpcyfam.exe PID 404 wrote to memory of 3024 404 yfpcyfam.exe explorer.exe PID 404 wrote to memory of 3024 404 yfpcyfam.exe explorer.exe PID 404 wrote to memory of 3024 404 yfpcyfam.exe explorer.exe PID 404 wrote to memory of 3024 404 yfpcyfam.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21.exe"C:\Users\Admin\AppData\Local\Temp\21.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\21.exeC:\Users\Admin\AppData\Local\Temp\21.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Uebadnkbfk\yfpcyfam.exeC:\Users\Admin\AppData\Roaming\Microsoft\Uebadnkbfk\yfpcyfam.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Uebadnkbfk\yfpcyfam.exeC:\Users\Admin\AppData\Roaming\Microsoft\Uebadnkbfk\yfpcyfam.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn llvzeuqo /tr "\"C:\Users\Admin\AppData\Local\Temp\21.exe\" /I llvzeuqo" /SC ONCE /Z /ST 07:12 /ET 07:242⤵
- Creates scheduled task(s)
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\21.exeC:\Users\Admin\AppData\Local\Temp\21.exe /I llvzeuqo1⤵PID:3484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5ae8cdccf10b699d1abfa184dc83cb7d5
SHA1f57372d3f81eb28f565214796f211a462d9b7b73
SHA256d3a8eb05adf8e512a1d25936ba5c79051ed17e5c2ea8e9a2064fcb8597813fbd
SHA5121075e777b8167ab855aa568734ff1fe50856c2914387de09bd31ef88661db35cfb975194223b8f0fe9a32d942d6ada203fcbf2993767843867ff15dc621a4538
-
Filesize
214KB
MD5dd02e9fe9baf3f3ec6a70497a63face1
SHA1a3ca2d93ba6ae5bf652c0e0268734000208e8d65
SHA2560bd6894c52fd77e1e13de3c97cb9b79757c73d1441f2bee852d6af9e954e3b59
SHA512cffe879f3c57cae85049d9836e15ed3e03246b33d88ec332707ec82157f2be4e804625eae8c4c6a2472fe72bc4ed82191e8c5bfb4420e704aca7b3543c164db7
-
Filesize
214KB
MD5dd02e9fe9baf3f3ec6a70497a63face1
SHA1a3ca2d93ba6ae5bf652c0e0268734000208e8d65
SHA2560bd6894c52fd77e1e13de3c97cb9b79757c73d1441f2bee852d6af9e954e3b59
SHA512cffe879f3c57cae85049d9836e15ed3e03246b33d88ec332707ec82157f2be4e804625eae8c4c6a2472fe72bc4ed82191e8c5bfb4420e704aca7b3543c164db7
-
Filesize
214KB
MD5dd02e9fe9baf3f3ec6a70497a63face1
SHA1a3ca2d93ba6ae5bf652c0e0268734000208e8d65
SHA2560bd6894c52fd77e1e13de3c97cb9b79757c73d1441f2bee852d6af9e954e3b59
SHA512cffe879f3c57cae85049d9836e15ed3e03246b33d88ec332707ec82157f2be4e804625eae8c4c6a2472fe72bc4ed82191e8c5bfb4420e704aca7b3543c164db7