Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 15:00
Static task
static1
Behavioral task
behavioral1
Sample
Calculation.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Calculation.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
vertices/asteroidal.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
vertices/asteroidal.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
vertices/bombshell.dll
Resource
win7-20220901-en
General
-
Target
Calculation.lnk
-
Size
1KB
-
MD5
9ff4d8fdc5288f2c110d40c80c4dcc25
-
SHA1
522c827b70102c114c3efbe0e8dacf71ca7ce2b5
-
SHA256
6bcfce0c879a9fb19af5860fc8cad59149dbfe003e6b330f04ee25fd37554ee4
-
SHA512
563faf37901162d8e79efcbe94db9123a2e1987e2f1cf22fa9e47722ca019736422c1c1d4fceb14a9f31102acbaf3cba6bf96a83e4f7d6a9ad0b6a077ecf9c00
Malware Config
Extracted
qakbot
403.973
obama214
1666019778
105.96.221.136:443
37.37.80.2:3389
105.154.56.232:995
41.107.116.19:443
105.103.52.189:443
159.192.204.135:443
41.107.58.251:443
177.152.65.142:443
102.47.218.41:443
176.45.35.243:443
70.173.248.13:443
102.159.77.134:995
220.123.29.76:443
82.12.196.197:443
103.156.237.71:443
149.126.159.254:443
176.44.119.153:443
181.56.171.3:995
190.205.229.67:2222
151.251.50.117:443
163.182.177.80:443
72.21.109.1:443
41.101.92.195:443
190.193.180.228:443
190.204.112.207:2222
41.97.56.102:443
41.69.209.76:443
190.78.89.157:993
206.1.216.19:2087
85.242.200.96:443
41.251.219.50:443
105.111.141.73:443
41.103.64.82:443
190.39.218.17:443
84.220.13.28:443
190.100.149.122:995
197.1.19.60:443
196.64.70.216:443
196.89.213.40:995
181.168.145.94:443
187.101.200.186:995
41.105.245.174:443
179.25.144.177:995
78.179.135.247:443
94.52.127.44:443
186.18.210.16:443
102.158.215.180:443
78.183.238.79:443
197.1.50.150:443
42.189.32.186:80
167.58.235.5:443
14.54.83.15:443
187.198.8.241:443
71.239.12.136:443
112.70.141.221:443
37.245.136.135:2222
88.232.10.69:443
41.98.250.65:443
82.205.9.34:443
196.64.239.75:443
37.8.68.1:443
197.1.248.244:443
197.2.139.7:443
79.45.134.162:22
182.183.211.163:995
154.246.14.94:443
144.86.17.168:443
182.185.29.69:995
160.177.47.116:6881
181.197.41.173:443
160.248.194.147:443
85.109.221.97:443
125.25.77.249:995
1.20.185.138:443
91.171.72.214:32100
197.10.195.7:443
45.160.33.163:443
202.170.206.61:995
96.9.66.118:995
132.251.244.227:443
113.188.13.246:443
78.181.39.116:443
1.53.101.75:443
197.202.173.111:443
31.201.40.194:443
197.116.178.224:443
79.155.159.177:443
181.188.164.123:443
156.221.50.226:995
41.251.15.7:990
45.240.140.233:995
102.188.91.158:995
189.243.187.76:443
179.105.182.216:995
196.65.230.248:995
181.141.3.126:443
128.234.26.174:995
78.161.194.147:443
78.101.177.210:443
86.217.167.235:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1184 mb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1116 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1568 regsvr32.exe 1568 regsvr32.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe 216 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1568 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4960 2264 cmd.exe 85 PID 2264 wrote to memory of 4960 2264 cmd.exe 85 PID 4960 wrote to memory of 1184 4960 cmd.exe 86 PID 4960 wrote to memory of 1184 4960 cmd.exe 86 PID 1184 wrote to memory of 1568 1184 mb.exe 87 PID 1184 wrote to memory of 1568 1184 mb.exe 87 PID 1184 wrote to memory of 1568 1184 mb.exe 87 PID 1568 wrote to memory of 216 1568 regsvr32.exe 88 PID 1568 wrote to memory of 216 1568 regsvr32.exe 88 PID 1568 wrote to memory of 216 1568 regsvr32.exe 88 PID 1568 wrote to memory of 216 1568 regsvr32.exe 88 PID 1568 wrote to memory of 216 1568 regsvr32.exe 88 PID 4960 wrote to memory of 1116 4960 cmd.exe 89 PID 4960 wrote to memory of 1116 4960 cmd.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Calculation.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vertices\asteroidal.cmd regsvr2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\mb.exeC:\Users\Admin\AppData\Local\Temp\mb.exe vertices\bombshell.asc3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\regsvr32.exevertices\bombshell.asc4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022