Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2022 13:47
Static task
static1
Behavioral task
behavioral1
Sample
ScannedDocuments_0289716.lnk
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
ScannedDocuments_0289716.lnk
Resource
win10v2004-20220721-en
Behavioral task
behavioral3
Sample
local.dll
Resource
win7-20220718-en
General
-
Target
ScannedDocuments_0289716.lnk
-
Size
1KB
-
MD5
f7581541da8f50b6e5c80d2ff42ee57b
-
SHA1
ea8d8e5b84fb388520e3ac422a222e39f6a21420
-
SHA256
8c1771c049cf36eecc7a37f207536a1a5fc2ca074c26e8c8c4e9dc167b8b3415
-
SHA512
ad87452fe5a2f808ebf2873cf8aa173a39fa1adc0d4294fbe8658a191177c0633cf55f07f7afc446f72073d412bc261611ae25150b01bab6487138a0ded084ba
Malware Config
Extracted
qakbot
403.688
obama187
1654695312
197.164.182.46:993
70.51.135.90:2222
187.251.132.144:22
37.186.54.254:995
80.11.74.81:2222
41.84.236.245:995
24.139.72.117:443
177.94.57.126:32101
37.34.253.233:443
186.90.153.162:2222
32.221.224.140:995
208.107.221.224:443
67.165.206.193:993
63.143.92.99:995
88.232.220.207:443
189.78.107.163:32101
74.14.5.179:2222
148.0.56.63:443
40.134.246.185:995
173.21.10.71:2222
124.40.244.115:2222
24.55.67.176:443
39.44.164.54:995
102.182.232.3:995
39.49.101.104:995
31.35.28.29:443
120.150.218.241:995
197.89.128.201:443
31.48.174.63:2078
173.174.216.62:443
67.209.195.198:443
70.46.220.114:443
24.178.196.158:2222
92.132.172.197:2222
179.158.105.44:443
1.161.123.53:443
91.177.173.10:995
217.128.122.65:2222
144.202.3.39:995
144.202.2.175:443
45.76.167.26:995
149.28.238.199:995
140.82.63.183:995
140.82.63.183:443
45.63.1.12:443
149.28.238.199:443
45.76.167.26:443
144.202.3.39:443
144.202.2.175:995
45.63.1.12:995
109.12.111.14:443
84.241.8.23:32103
104.34.212.7:32103
108.60.213.141:443
117.248.109.38:21
217.165.109.10:993
82.152.39.39:443
47.23.89.60:993
176.67.56.94:443
148.64.96.100:443
76.70.9.169:2222
182.191.92.203:995
37.210.170.123:2222
202.134.152.2:2222
89.101.97.139:443
86.195.158.178:2222
140.82.49.12:443
93.48.80.198:995
187.207.131.50:61202
191.34.120.8:443
37.208.135.172:6883
75.99.168.194:61201
5.32.41.45:443
120.61.1.225:443
101.51.77.238:443
1.161.123.53:995
86.97.9.190:443
175.145.235.37:443
39.44.235.10:995
196.203.37.215:80
41.38.167.179:995
39.41.17.134:995
58.105.167.36:50000
39.52.119.141:995
76.25.142.196:443
73.151.236.31:443
96.37.113.36:993
174.69.215.101:443
201.142.177.168:443
85.246.82.244:443
201.145.165.25:443
201.172.23.68:2222
72.252.157.93:995
190.252.242.69:443
45.46.53.140:2222
79.80.80.29:2222
72.252.157.93:990
72.27.33.160:443
72.252.157.93:993
90.120.65.153:2078
201.103.141.2:443
69.14.172.24:443
31.215.185.26:2222
191.112.12.128:443
189.253.206.105:443
82.41.63.217:443
208.101.82.0:443
210.246.4.69:995
83.110.92.106:443
180.129.108.214:995
47.157.227.70:443
89.86.33.217:443
177.156.191.231:443
94.36.193.176:2222
217.164.121.161:1194
86.98.149.168:2222
103.207.85.38:995
172.115.177.204:2222
105.27.172.6:443
71.24.118.253:443
143.0.219.6:995
217.165.176.49:2222
5.203.199.157:995
121.7.223.45:2222
47.156.131.10:443
177.209.202.242:2222
41.86.42.158:995
106.51.48.170:50001
41.84.229.240:443
94.71.169.212:995
111.125.245.116:995
201.242.175.29:2222
38.70.253.226:2222
187.149.236.5:443
217.165.79.88:443
85.255.232.18:443
103.246.242.202:443
41.230.62.211:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Pelkvwejhn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Iyamgweemys = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4948 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\edb1b0fc = 550f7ee57f70ee3dc6723a5197577bbf91412aea873ccd84bdc00c53a49d6dd56f761234a1aa4c3d5e4989c73cab4295006eb57f50bbee6c25475d49634000d4dd225115da3954c39913d11112a0bde75d7faeb5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\609207d7 = 8ae242931bae13f46e51f5bc49004b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\1fdb6821 = 6f3fc00d8498b17ca15b72c5aba2fef7672e0456b72b73f8549af153b1190a46e46c5766fb81c8129af3fb76b0bc14f728d4a5db1f21f5e99d93b04d43a15c6b8bddbd7408b3c84c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\28059813 = 68ba847e5fc24861d1780b875db2811d59bfe7efaed373282a9873e39bdecd4a2aedc4244be595053e3c482eee075b10e3d8038870c7568b1224666f35905e2969c1093460a5e88b335b9ca7e50a30bcbbf71f894be30ab52a479044aa6afa42 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\1fdb6821 = 6f3fd70d8498840d39d5d320966ea3a065d600bb4ffad984837e68b9322d26af95da8748cc575706ffe7cbcfda29e6866c2d0c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\2a44b86f = 1e3ff6c3cdb753f3648c1257050e8dd87ce2e8585b7c6739c9eec50b77a6890a873c3f51f69d4c1cf153fd5ca2a347e32cc53715ef18762fe4e37ceca258d3fcee205f432ba3f9d56e8bb12c3b26622f31524ec66e0d1029dedb726dba63200d6bd7536c25785f153393a1834f7f638220586e098a3943d377e5720e57934d944d09d9c4174667de983ff53b49bc223b75a15b2004233512451383a8766ac41b8679ea1b82d331bbaf35b0070f9895e8ee6cf9783a608c6a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\90b9ff76 = 670856fbc7e03270686f9e84f72ddfd601bce91ba633aa167ccc45c41121e6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\550dd799 = ac040971e162093cf710c936c76186db2815e2d7ef3617a1e98efc54ede5b68953de85a805a9b87eafc7296b2ba512 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj\92f8df0a = 39ba1a71968d330491e2d530b4be847ba723519fa14b2d4439b233834e5bb34edf6203783e6faf0546e03e893f6d638a07280ba3495d8fb0b312833605d3d27d5ab058c319084eec4e812fa8184f97ff87935501a8af5716d9bb541b306a9763de6dfc02f6fe0a9fe85a48733d33 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vaprnrpyj explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeexplorer.exepid process 2024 rundll32.exe 2024 rundll32.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe 4228 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 2024 rundll32.exe 4948 regsvr32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
cmd.exerundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 3996 wrote to memory of 4128 3996 cmd.exe rundll32.exe PID 3996 wrote to memory of 4128 3996 cmd.exe rundll32.exe PID 4128 wrote to memory of 2024 4128 rundll32.exe rundll32.exe PID 4128 wrote to memory of 2024 4128 rundll32.exe rundll32.exe PID 4128 wrote to memory of 2024 4128 rundll32.exe rundll32.exe PID 2024 wrote to memory of 4228 2024 rundll32.exe explorer.exe PID 2024 wrote to memory of 4228 2024 rundll32.exe explorer.exe PID 2024 wrote to memory of 4228 2024 rundll32.exe explorer.exe PID 2024 wrote to memory of 4228 2024 rundll32.exe explorer.exe PID 2024 wrote to memory of 4228 2024 rundll32.exe explorer.exe PID 4228 wrote to memory of 3436 4228 explorer.exe schtasks.exe PID 4228 wrote to memory of 3436 4228 explorer.exe schtasks.exe PID 4228 wrote to memory of 3436 4228 explorer.exe schtasks.exe PID 3344 wrote to memory of 4948 3344 regsvr32.exe regsvr32.exe PID 3344 wrote to memory of 4948 3344 regsvr32.exe regsvr32.exe PID 3344 wrote to memory of 4948 3344 regsvr32.exe regsvr32.exe PID 4948 wrote to memory of 4340 4948 regsvr32.exe explorer.exe PID 4948 wrote to memory of 4340 4948 regsvr32.exe explorer.exe PID 4948 wrote to memory of 4340 4948 regsvr32.exe explorer.exe PID 4948 wrote to memory of 4340 4948 regsvr32.exe explorer.exe PID 4948 wrote to memory of 4340 4948 regsvr32.exe explorer.exe PID 4340 wrote to memory of 2604 4340 explorer.exe reg.exe PID 4340 wrote to memory of 2604 4340 explorer.exe reg.exe PID 4340 wrote to memory of 1308 4340 explorer.exe reg.exe PID 4340 wrote to memory of 1308 4340 explorer.exe reg.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ScannedDocuments_0289716.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" local.dll,DllInstall2⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" local.dll,DllInstall3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn sxxloxgxxw /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\local.dll\"" /SC ONCE /Z /ST 15:49 /ET 16:015⤵
- Creates scheduled task(s)
PID:3436
-
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\local.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\local.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Pelkvwejhn" /d "0"4⤵
- Windows security bypass
PID:2604
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Iyamgweemys" /d "0"4⤵
- Windows security bypass
PID:1308
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
843KB
MD53bc34123feafc82ec82db6650b890763
SHA1df2755125d32051b9beb38de38a9a960d2ae7b31
SHA2561a1296b3063923647f59aedf3a12d8fccb700e4c5181c875b8622b7965cfb564
SHA512518a7b443222c7119d66187ce09fdd80b2fba547f7be73b6448c412d2536499181105b5641bed9f65b505e783454f0d8f691ece0ddc0ceac2c3f515220105152
-
Filesize
843KB
MD53bc34123feafc82ec82db6650b890763
SHA1df2755125d32051b9beb38de38a9a960d2ae7b31
SHA2561a1296b3063923647f59aedf3a12d8fccb700e4c5181c875b8622b7965cfb564
SHA512518a7b443222c7119d66187ce09fdd80b2fba547f7be73b6448c412d2536499181105b5641bed9f65b505e783454f0d8f691ece0ddc0ceac2c3f515220105152