Overview
overview
10Static
static
CardS.lnk
windows7-x64
3CardS.lnk
windows10-2004-x64
3brickwork/...ans.js
windows7-x64
3brickwork/...ans.js
windows10-2004-x64
1brickwork/...is.dll
windows7-x64
10brickwork/...is.dll
windows10-2004-x64
10brickwork/...te.cmd
windows7-x64
1brickwork/...te.cmd
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
CardS.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CardS.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
brickwork/constantineEquestrians.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
brickwork/constantineEquestrians.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
brickwork/rhinitis.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
brickwork/rhinitis.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
brickwork/scoffersDebate.cmd
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
brickwork/scoffersDebate.cmd
Resource
win10v2004-20220812-en
General
-
Target
brickwork/rhinitis.dll
-
Size
653KB
-
MD5
8f2fb30e75a8434382eddef86ecda768
-
SHA1
dfb888ddad9c2111de010532f2539b9fddb99e7b
-
SHA256
27fbfb86936343fc18bb61811401c96c052ecdff080da3bdb403545d55cf2b2a
-
SHA512
a4f0707562157666143a20860ca1d3d8a49f9ffba79b7066361a35beba4488c81e0a4822bd9bdf7a6c7028c7aa066d2f295a36890577d2b4ea9b3da66adbcbf3
-
SSDEEP
12288:DzGUo9tIf1JUFR+NcGW4izhxSsB20HQ+n3VGo9lD0ZoggSVSK7t:DzG3QtiRgbWhbLdQG3VGonQo4t
Malware Config
Extracted
qakbot
75.116.87.44:14933
64.55.103.194:9151
80.214.68.88:40730
97.184.129.40:2118
216.44.143.70:26851
239.39.127.10:38876
57.33.10.57:17737
201.128.252.151:58865
211.76.239.250:34506
124.58.65.86:13247
41.8.154.58:7614
6.55.240.195:27003
139.242.121.12:23370
8.81.30.103:64297
168.13.24.67:37382
17.219.125.20:59669
136.66.66.194:40287
63.172.177.141:57252
195.44.25.26:29277
67.212.106.154:59890
149.254.111.67:39052
184.74.22.12:50436
166.33.149.229:19515
172.102.164.60:43562
155.28.49.2:51545
7.122.114.191:33775
220.68.130.196:7948
121.236.113.177:14197
47.2.191.47:32393
49.93.218.109:41033
174.124.34.188:14831
178.143.168.245:48707
159.196.166.193:58136
1.104.105.37:49572
225.108.223.250:46683
105.208.24.120:59473
180.179.25.125:42514
236.83.216.21:0
90.29.227.242:1085
212.204.93.86:48405
115.34.223.65:24926
250.151.244.173:3488
16.95.145.59:42025
50.6.212.181:17804
23.86.160.130:53103
212.133.85.240:62503
122.125.236.31:0
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1152 regsvr32.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe 940 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1152 regsvr32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 328 wrote to memory of 1152 328 regsvr32.exe 27 PID 328 wrote to memory of 1152 328 regsvr32.exe 27 PID 328 wrote to memory of 1152 328 regsvr32.exe 27 PID 328 wrote to memory of 1152 328 regsvr32.exe 27 PID 328 wrote to memory of 1152 328 regsvr32.exe 27 PID 328 wrote to memory of 1152 328 regsvr32.exe 27 PID 328 wrote to memory of 1152 328 regsvr32.exe 27 PID 1152 wrote to memory of 940 1152 regsvr32.exe 28 PID 1152 wrote to memory of 940 1152 regsvr32.exe 28 PID 1152 wrote to memory of 940 1152 regsvr32.exe 28 PID 1152 wrote to memory of 940 1152 regsvr32.exe 28 PID 1152 wrote to memory of 940 1152 regsvr32.exe 28 PID 1152 wrote to memory of 940 1152 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\brickwork\rhinitis.dll1⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\brickwork\rhinitis.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-