Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-08-2022 08:18
Static task
static1
Behavioral task
behavioral1
Sample
50600999_420925.img
Resource
win7-20220812-en
General
-
Target
50600999_420925.img
-
Size
2.6MB
-
MD5
5531d308f169eb4387f80202b68333a0
-
SHA1
bac447aa3281946bca9c501d8c18fcf2f5a1c0d1
-
SHA256
81343a9be0c301685f76fa2185dc8b28c0e8aebdca6f23ba12a4412685e286f6
-
SHA512
75ef718691db75eebc044590c499982acd1a83e9986eb0be15a951ed5ccc7401a58a5d7a146989977bb32180e4a2f0c44913b1adc54641e50a4bbb3d9b0e85ad
Malware Config
Extracted
qakbot
403.694
obama186
1654596660
67.165.206.193:993
63.143.92.99:995
74.14.5.179:2222
182.191.92.203:995
197.89.8.51:443
89.101.97.139:443
86.97.9.190:443
124.40.244.115:2222
80.11.74.81:2222
41.215.153.104:995
179.100.20.32:32101
31.35.28.29:443
202.134.152.2:2222
109.12.111.14:443
93.48.80.198:995
120.150.218.241:995
41.38.167.179:995
177.94.57.126:32101
173.174.216.62:443
1.161.101.20:443
88.224.254.172:443
82.41.63.217:443
67.209.195.198:443
70.46.220.114:443
24.178.196.158:2222
39.44.213.68:995
84.241.8.23:32103
210.246.4.69:995
92.132.172.197:2222
91.177.173.10:995
217.128.122.65:2222
149.28.238.199:995
45.76.167.26:995
45.63.1.12:443
144.202.2.175:443
45.63.1.12:995
144.202.3.39:995
144.202.2.175:995
45.76.167.26:443
149.28.238.199:443
144.202.3.39:443
140.82.63.183:995
140.82.63.183:443
175.145.235.37:443
85.246.82.244:443
47.23.89.60:993
187.207.131.50:61202
176.67.56.94:443
148.64.96.100:443
140.82.49.12:443
76.70.9.169:2222
217.164.121.161:2222
72.27.33.160:443
108.60.213.141:443
104.34.212.7:32103
39.44.158.215:995
31.48.174.63:2078
75.99.168.194:61201
117.248.109.38:21
83.110.218.147:993
82.152.39.39:443
180.129.108.214:995
5.32.41.45:443
83.110.92.106:443
197.164.182.46:993
196.203.37.215:80
186.90.153.162:2222
37.186.54.254:995
89.211.179.247:2222
24.139.72.117:443
201.142.177.168:443
37.34.253.233:443
69.14.172.24:443
125.24.187.183:443
208.107.221.224:443
174.69.215.101:443
76.25.142.196:443
96.37.113.36:993
173.21.10.71:2222
73.151.236.31:443
45.46.53.140:2222
189.146.90.232:443
70.51.135.90:2222
190.252.242.69:443
201.145.165.25:443
47.157.227.70:443
72.252.157.93:993
177.205.155.85:443
72.252.157.93:995
187.251.132.144:22
40.134.246.185:995
24.55.67.176:443
79.80.80.29:2222
179.158.105.44:443
72.252.157.93:990
89.86.33.217:443
201.172.23.68:2222
102.182.232.3:995
177.156.191.231:443
39.49.96.122:995
94.36.193.176:2222
120.61.1.114:443
217.164.121.161:1194
39.41.29.200:995
86.195.158.178:2222
86.98.149.168:2222
1.161.101.20:995
124.109.35.32:995
172.115.177.204:2222
105.27.172.6:443
32.221.224.140:995
208.101.82.0:443
71.24.118.253:443
143.0.219.6:995
217.165.176.49:2222
90.120.65.153:2078
5.203.199.157:995
39.52.41.80:995
148.0.56.63:443
191.112.25.187:443
121.7.223.45:2222
47.156.131.10:443
177.209.202.242:2222
41.86.42.158:995
106.51.48.170:50001
41.84.229.240:443
94.71.169.212:995
111.125.245.116:995
78.101.193.241:6883
201.242.175.29:2222
38.70.253.226:2222
187.149.236.5:443
217.165.79.88:443
85.255.232.18:443
103.246.242.202:443
41.230.62.211:995
67.69.166.79:2222
42.228.224.249:2222
172.114.160.81:995
94.26.122.9:995
75.99.168.194:443
189.253.206.105:443
81.215.196.174:443
46.107.48.202:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 59 IoCs
Processes:
rundll32.exeexplorer.exepid process 1740 rundll32.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe 1000 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 1740 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zG.exeAUDIODG.EXEdescription pid process Token: SeRestorePrivilege 972 7zG.exe Token: 35 972 7zG.exe Token: SeSecurityPrivilege 972 7zG.exe Token: SeSecurityPrivilege 972 7zG.exe Token: 33 1432 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1432 AUDIODG.EXE Token: 33 1432 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1432 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zG.exepid process 972 7zG.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
cmd.exerundll32.exerundll32.exeexplorer.exedescription pid process target process PID 1176 wrote to memory of 1708 1176 cmd.exe isoburn.exe PID 1176 wrote to memory of 1708 1176 cmd.exe isoburn.exe PID 1176 wrote to memory of 1708 1176 cmd.exe isoburn.exe PID 1424 wrote to memory of 1740 1424 rundll32.exe rundll32.exe PID 1424 wrote to memory of 1740 1424 rundll32.exe rundll32.exe PID 1424 wrote to memory of 1740 1424 rundll32.exe rundll32.exe PID 1424 wrote to memory of 1740 1424 rundll32.exe rundll32.exe PID 1424 wrote to memory of 1740 1424 rundll32.exe rundll32.exe PID 1424 wrote to memory of 1740 1424 rundll32.exe rundll32.exe PID 1424 wrote to memory of 1740 1424 rundll32.exe rundll32.exe PID 1740 wrote to memory of 1000 1740 rundll32.exe explorer.exe PID 1740 wrote to memory of 1000 1740 rundll32.exe explorer.exe PID 1740 wrote to memory of 1000 1740 rundll32.exe explorer.exe PID 1740 wrote to memory of 1000 1740 rundll32.exe explorer.exe PID 1740 wrote to memory of 1000 1740 rundll32.exe explorer.exe PID 1740 wrote to memory of 1000 1740 rundll32.exe explorer.exe PID 1000 wrote to memory of 1040 1000 explorer.exe schtasks.exe PID 1000 wrote to memory of 1040 1000 explorer.exe schtasks.exe PID 1000 wrote to memory of 1040 1000 explorer.exe schtasks.exe PID 1000 wrote to memory of 1040 1000 explorer.exe schtasks.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\50600999_420925.img1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\50600999_420925.img"2⤵
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\50600999_420925\" -spe -an -ai#7zMap28746:110:7zEvent225941⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" 019338921.dll,DllInstall1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" 019338921.dll,DllInstall2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn oiuqydi /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\50600999_420925\019338921.dll\"" /SC ONCE /Z /ST 08:21 /ET 08:334⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\50600999_420925\019338921.dllFilesize
1.4MB
MD5889de0fcbdf800a0732d5909c5b16057
SHA1925b2fa5fdd084651f84f3b3c4381b0a10ef3ad3
SHA256f9d073248e84c44c6130c379cf845290b701dd9312e4114caf4b3a99f70e3e8e
SHA512303911ea66cca532b57b5acd3565f13d3500760eda42bf90653154f482e7d640d0cd318c1f9fd97570dbe7b18cd533deee34b3d2416d4c588a9cabfe47d99777
-
\Users\Admin\AppData\Local\Temp\50600999_420925\019338921.dllFilesize
1.4MB
MD5889de0fcbdf800a0732d5909c5b16057
SHA1925b2fa5fdd084651f84f3b3c4381b0a10ef3ad3
SHA256f9d073248e84c44c6130c379cf845290b701dd9312e4114caf4b3a99f70e3e8e
SHA512303911ea66cca532b57b5acd3565f13d3500760eda42bf90653154f482e7d640d0cd318c1f9fd97570dbe7b18cd533deee34b3d2416d4c588a9cabfe47d99777
-
\Users\Admin\AppData\Local\Temp\50600999_420925\019338921.dllFilesize
1.4MB
MD5889de0fcbdf800a0732d5909c5b16057
SHA1925b2fa5fdd084651f84f3b3c4381b0a10ef3ad3
SHA256f9d073248e84c44c6130c379cf845290b701dd9312e4114caf4b3a99f70e3e8e
SHA512303911ea66cca532b57b5acd3565f13d3500760eda42bf90653154f482e7d640d0cd318c1f9fd97570dbe7b18cd533deee34b3d2416d4c588a9cabfe47d99777
-
\Users\Admin\AppData\Local\Temp\50600999_420925\019338921.dllFilesize
1.4MB
MD5889de0fcbdf800a0732d5909c5b16057
SHA1925b2fa5fdd084651f84f3b3c4381b0a10ef3ad3
SHA256f9d073248e84c44c6130c379cf845290b701dd9312e4114caf4b3a99f70e3e8e
SHA512303911ea66cca532b57b5acd3565f13d3500760eda42bf90653154f482e7d640d0cd318c1f9fd97570dbe7b18cd533deee34b3d2416d4c588a9cabfe47d99777
-
\Users\Admin\AppData\Local\Temp\50600999_420925\019338921.dllFilesize
1.4MB
MD5889de0fcbdf800a0732d5909c5b16057
SHA1925b2fa5fdd084651f84f3b3c4381b0a10ef3ad3
SHA256f9d073248e84c44c6130c379cf845290b701dd9312e4114caf4b3a99f70e3e8e
SHA512303911ea66cca532b57b5acd3565f13d3500760eda42bf90653154f482e7d640d0cd318c1f9fd97570dbe7b18cd533deee34b3d2416d4c588a9cabfe47d99777
-
memory/1000-96-0x0000000000000000-mapping.dmp
-
memory/1000-102-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/1000-100-0x0000000000080000-0x00000000000A2000-memory.dmpFilesize
136KB
-
memory/1000-98-0x0000000074041000-0x0000000074043000-memory.dmpFilesize
8KB
-
memory/1040-101-0x0000000000000000-mapping.dmp
-
memory/1176-54-0x000007FEFB981000-0x000007FEFB983000-memory.dmpFilesize
8KB
-
memory/1708-76-0x0000000000000000-mapping.dmp
-
memory/1740-90-0x0000000001F80000-0x00000000020E5000-memory.dmpFilesize
1.4MB
-
memory/1740-94-0x0000000000220000-0x000000000024D000-memory.dmpFilesize
180KB
-
memory/1740-95-0x00000000004A0000-0x00000000004C2000-memory.dmpFilesize
136KB
-
memory/1740-92-0x00000000004A0000-0x00000000004C2000-memory.dmpFilesize
136KB
-
memory/1740-93-0x00000000004A0000-0x00000000004C2000-memory.dmpFilesize
136KB
-
memory/1740-99-0x00000000004A0000-0x00000000004C2000-memory.dmpFilesize
136KB
-
memory/1740-91-0x00000000004A0000-0x00000000004C2000-memory.dmpFilesize
136KB
-
memory/1740-85-0x00000000759E1000-0x00000000759E3000-memory.dmpFilesize
8KB
-
memory/1740-84-0x0000000000000000-mapping.dmp