Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2022 22:20
Static task
static1
Behavioral task
behavioral1
Sample
7965/3601.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7965/3601.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
7965/6388.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
7965/6388.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
7965/usurpers.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
7965/usurpers.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
ContractCopy.lnk
Resource
win7-20220812-en
General
-
Target
ContractCopy.lnk
-
Size
1KB
-
MD5
c4a27e331d90565b9c5c41df4f8521c2
-
SHA1
fd82da522c132784bd65848f5e782fc99ce9ccc5
-
SHA256
c26d8122378f47949e55d83eed5de107e7a2d08b1a6b5826d185458fa6142309
-
SHA512
9098dfd1c7c35c718b7697a754519d4ae2e7311a4790fbaba6e7395f24abf3a6a9e6d5c7d593034cf75022534566c99f4695c65db4c89df2e457048e446404d8
Malware Config
Extracted
qakbot
156.36.22.250:12263
73.225.210.175:40922
19.138.81.187:38748
191.101.43.136:10968
145.20.244.169:39814
74.30.254.35:15530
138.94.26.23:49965
218.175.98.133:15428
181.245.40.43:1982
24.10.174.212:30807
253.219.195.173:1546
51.182.7.163:21304
191.68.117.56:28754
246.29.132.217:16625
149.181.112.217:33637
136.20.21.112:41199
80.65.15.199:35765
0.222.227.111:63041
209.240.1.52:53226
66.57.60.202:19263
204.187.37.185:59783
177.172.2.9:36791
98.78.50.99:11939
11.5.197.37:32044
75.234.214.212:7741
49.66.110.196:42474
97.107.137.246:58239
0.141.208.192:39992
185.156.9.78:29812
219.151.188.60:3622
28.86.80.9:6038
138.226.185.49:25801
99.128.65.72:12277
90.175.231.93:54035
198.125.102.127:36652
148.215.17.55:16834
211.255.222.125:38939
198.140.91.23:0
15.114.17.14:1442
56.9.100.20:53368
88.117.146.12:40265
200.215.143.195:52771
134.133.152.217:5132
227.189.195.57:42370
76.219.151.168:17454
17.1.24.235:65225
217.27.142.33:46036
13.16.220.0:0
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.execmd.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 4216 regsvr32.exe 4216 regsvr32.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 4216 regsvr32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
cmd.execmd.exeWScript.execmd.exeregsvr32.exeregsvr32.exedescription pid process target process PID 396 wrote to memory of 4460 396 cmd.exe cmd.exe PID 396 wrote to memory of 4460 396 cmd.exe cmd.exe PID 4460 wrote to memory of 4604 4460 cmd.exe WScript.exe PID 4460 wrote to memory of 4604 4460 cmd.exe WScript.exe PID 4604 wrote to memory of 4924 4604 WScript.exe cmd.exe PID 4604 wrote to memory of 4924 4604 WScript.exe cmd.exe PID 4924 wrote to memory of 4504 4924 cmd.exe regsvr32.exe PID 4924 wrote to memory of 4504 4924 cmd.exe regsvr32.exe PID 4504 wrote to memory of 4216 4504 regsvr32.exe regsvr32.exe PID 4504 wrote to memory of 4216 4504 regsvr32.exe regsvr32.exe PID 4504 wrote to memory of 4216 4504 regsvr32.exe regsvr32.exe PID 4216 wrote to memory of 1500 4216 regsvr32.exe wermgr.exe PID 4216 wrote to memory of 1500 4216 regsvr32.exe wermgr.exe PID 4216 wrote to memory of 1500 4216 regsvr32.exe wermgr.exe PID 4216 wrote to memory of 1500 4216 regsvr32.exe wermgr.exe PID 4216 wrote to memory of 1500 4216 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ContractCopy.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c %cd%\7965\3601.js2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7965\3601.js"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7965\6388.cmd" reg sv"4⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\regsvr32.exeregsvr32 7965\usurpers.dat5⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\regsvr32.exe7965\usurpers.dat6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500