Analysis
-
max time kernel
155s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-10-2022 22:20
Static task
static1
Behavioral task
behavioral1
Sample
7965/3601.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7965/3601.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
7965/6388.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
7965/6388.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
7965/usurpers.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
7965/usurpers.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
ContractCopy.lnk
Resource
win7-20220812-en
General
-
Target
ContractCopy.lnk
-
Size
1KB
-
MD5
c4a27e331d90565b9c5c41df4f8521c2
-
SHA1
fd82da522c132784bd65848f5e782fc99ce9ccc5
-
SHA256
c26d8122378f47949e55d83eed5de107e7a2d08b1a6b5826d185458fa6142309
-
SHA512
9098dfd1c7c35c718b7697a754519d4ae2e7311a4790fbaba6e7395f24abf3a6a9e6d5c7d593034cf75022534566c99f4695c65db4c89df2e457048e446404d8
Malware Config
Extracted
qakbot
156.36.22.250:12263
73.225.210.175:40922
19.138.81.187:38748
191.101.43.136:10968
145.20.244.169:39814
74.30.254.35:15530
138.94.26.23:49965
218.175.98.133:15428
181.245.40.43:1982
24.10.174.212:30807
253.219.195.173:1546
51.182.7.163:21304
191.68.117.56:28754
246.29.132.217:16625
149.181.112.217:33637
136.20.21.112:41199
80.65.15.199:35765
0.222.227.111:63041
209.240.1.52:53226
66.57.60.202:19263
204.187.37.185:59783
177.172.2.9:36791
98.78.50.99:11939
11.5.197.37:32044
75.234.214.212:7741
49.66.110.196:42474
97.107.137.246:58239
0.141.208.192:39992
185.156.9.78:29812
219.151.188.60:3622
28.86.80.9:6038
138.226.185.49:25801
99.128.65.72:12277
90.175.231.93:54035
198.125.102.127:36652
148.215.17.55:16834
211.255.222.125:38939
198.140.91.23:0
15.114.17.14:1442
56.9.100.20:53368
88.117.146.12:40265
200.215.143.195:52771
134.133.152.217:5132
227.189.195.57:42370
76.219.151.168:17454
17.1.24.235:65225
217.27.142.33:46036
13.16.220.0:0
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
regsvr32.exepid process 1380 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 452 regsvr32.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe 1140 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 452 regsvr32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
cmd.execmd.exeWScript.execmd.exeregsvr32.exeregsvr32.exedescription pid process target process PID 364 wrote to memory of 1968 364 cmd.exe cmd.exe PID 364 wrote to memory of 1968 364 cmd.exe cmd.exe PID 364 wrote to memory of 1968 364 cmd.exe cmd.exe PID 1968 wrote to memory of 108 1968 cmd.exe WScript.exe PID 1968 wrote to memory of 108 1968 cmd.exe WScript.exe PID 1968 wrote to memory of 108 1968 cmd.exe WScript.exe PID 108 wrote to memory of 1656 108 WScript.exe cmd.exe PID 108 wrote to memory of 1656 108 WScript.exe cmd.exe PID 108 wrote to memory of 1656 108 WScript.exe cmd.exe PID 1656 wrote to memory of 1380 1656 cmd.exe regsvr32.exe PID 1656 wrote to memory of 1380 1656 cmd.exe regsvr32.exe PID 1656 wrote to memory of 1380 1656 cmd.exe regsvr32.exe PID 1656 wrote to memory of 1380 1656 cmd.exe regsvr32.exe PID 1656 wrote to memory of 1380 1656 cmd.exe regsvr32.exe PID 1380 wrote to memory of 452 1380 regsvr32.exe regsvr32.exe PID 1380 wrote to memory of 452 1380 regsvr32.exe regsvr32.exe PID 1380 wrote to memory of 452 1380 regsvr32.exe regsvr32.exe PID 1380 wrote to memory of 452 1380 regsvr32.exe regsvr32.exe PID 1380 wrote to memory of 452 1380 regsvr32.exe regsvr32.exe PID 1380 wrote to memory of 452 1380 regsvr32.exe regsvr32.exe PID 1380 wrote to memory of 452 1380 regsvr32.exe regsvr32.exe PID 452 wrote to memory of 1140 452 regsvr32.exe wermgr.exe PID 452 wrote to memory of 1140 452 regsvr32.exe wermgr.exe PID 452 wrote to memory of 1140 452 regsvr32.exe wermgr.exe PID 452 wrote to memory of 1140 452 regsvr32.exe wermgr.exe PID 452 wrote to memory of 1140 452 regsvr32.exe wermgr.exe PID 452 wrote to memory of 1140 452 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ContractCopy.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c %cd%\7965\3601.js2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7965\3601.js"3⤵
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7965\6388.cmd" reg sv"4⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\regsvr32.exeregsvr32 7965\usurpers.dat5⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\regsvr32.exe7965\usurpers.dat6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140