Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2022 15:01
Static task
static1
Behavioral task
behavioral1
Sample
ComplianceReportCopy#1895.html
Resource
win7-20220812-en
General
-
Target
ComplianceReportCopy#1895.html
-
Size
948KB
-
MD5
fc215315429a2e75ed87b7bb0003ae03
-
SHA1
09226ca97e186af4eb6d10a4f0487aed35e1bf00
-
SHA256
e03a155f5d48ed8f464d85fd9195e66466cd83904326b381d56c7e75f964493f
-
SHA512
819596fdc26d753f151021277fd01104d1e273c03e52573a565ec2a987bc83d4f3582f0dda3f5a4d239a0203bf1dbd5898c8db5c9cb6c84507304bbe734ac857
-
SSDEEP
12288:Eeu/HcqMiBik2duJteYCG5nZaH0RM4gY9OJ9LWE91BdXU68O0DN+eSM06c51KdKl:lwH4BFetJZuVk9OJ9L/Bdk610B506ql
Malware Config
Extracted
qakbot
403.1051
obama216
1666689942
24.116.45.121:443
24.206.27.39:443
71.199.168.185:443
70.115.104.126:443
190.24.45.24:995
24.9.220.167:443
68.62.199.70:443
43.241.159.238:443
113.162.196.232:443
156.217.60.239:995
197.204.70.167:443
197.202.196.43:443
24.130.228.100:443
41.109.228.108:995
64.123.103.123:443
190.193.180.228:443
24.177.111.153:443
60.54.65.27:443
189.129.38.158:2222
206.1.164.250:443
190.36.189.34:993
173.49.74.62:443
41.99.110.44:443
190.203.51.133:2222
174.29.45.113:443
222.117.141.133:443
190.207.137.189:2222
208.78.220.120:443
105.111.81.57:443
105.158.78.171:443
24.207.97.117:443
88.240.75.201:443
105.154.214.130:995
41.104.155.245:443
41.98.242.254:443
196.70.146.120:443
90.165.109.4:2222
75.84.234.68:443
65.140.11.170:443
186.154.189.162:995
191.96.67.93:995
151.213.183.141:995
184.159.76.47:443
105.98.223.169:443
190.201.145.155:443
197.0.225.39:443
78.179.135.247:443
197.2.193.4:995
152.170.17.136:443
191.33.187.192:2222
41.101.193.38:443
105.156.0.235:995
98.207.190.55:443
41.47.249.185:443
186.18.210.16:443
196.207.146.151:443
118.174.207.134:995
47.14.229.4:443
41.234.116.241:993
190.37.112.223:2222
14.54.83.15:443
93.156.96.171:443
58.186.75.42:443
189.110.3.60:2222
167.58.254.85:443
186.18.77.99:443
41.107.78.169:443
102.159.194.141:443
149.126.159.224:443
201.208.58.92:2222
156.196.169.222:443
190.100.149.122:995
1.0.215.176:443
202.5.53.143:443
206.1.222.56:2087
102.156.162.83:443
220.134.54.185:2222
190.37.174.11:2222
176.241.48.177:443
190.29.228.61:443
41.101.183.90:443
94.36.5.31:443
102.184.30.42:443
102.187.63.127:995
190.33.87.140:443
187.198.16.39:443
62.46.231.64:443
42.116.54.220:443
197.244.204.128:443
190.203.106.109:2222
200.155.61.245:995
200.155.61.245:443
105.105.46.239:443
41.143.109.111:61202
91.171.72.214:32100
136.232.184.134:995
186.52.96.202:995
163.182.177.80:443
167.56.53.143:995
181.141.3.126:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
aloofnessQuell.compid process 1132 aloofnessQuell.com -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.exedescription ioc process File opened (read-only) \??\E: cmd.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\attachment.zip:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 4032 regsvr32.exe 4032 regsvr32.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe 2280 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 4032 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 4956 firefox.exe Token: SeDebugPrivilege 4956 firefox.exe Token: SeDebugPrivilege 4956 firefox.exe Token: SeDebugPrivilege 4956 firefox.exe Token: SeDebugPrivilege 4956 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
firefox.exepid process 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe 4956 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4904 wrote to memory of 4956 4904 firefox.exe firefox.exe PID 4956 wrote to memory of 1280 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 1280 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 3436 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe PID 4956 wrote to memory of 4264 4956 firefox.exe firefox.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Users\Admin\AppData\Local\Temp\ComplianceReportCopy#1895.html1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Users\Admin\AppData\Local\Temp\ComplianceReportCopy#1895.html2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4956.0.1345252783\366883094" -parentBuildID 20200403170909 -prefsHandle 1684 -prefMapHandle 1676 -prefsLen 1 -prefMapSize 220117 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4956 "\\.\pipe\gecko-crash-server-pipe.4956" 1764 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4956.3.1777550678\850897927" -childID 1 -isForBrowser -prefsHandle 2532 -prefMapHandle 2524 -prefsLen 112 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4956 "\\.\pipe\gecko-crash-server-pipe.4956" 2456 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4956.13.320831\1313000310" -childID 2 -isForBrowser -prefsHandle 3012 -prefMapHandle 3008 -prefsLen 897 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4956 "\\.\pipe\gecko-crash-server-pipe.4956" 3024 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4956.20.1844068975\417675187" -childID 3 -isForBrowser -prefsHandle 3816 -prefMapHandle 3812 -prefsLen 6894 -prefMapSize 220117 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4956 "\\.\pipe\gecko-crash-server-pipe.4956" 3824 tab3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c standby\prefixes.cmd regs1⤵
- Enumerates connected drives
-
C:\Users\Admin\AppData\Local\Temp\aloofnessQuell.comC:\Users\Admin\AppData\Local\Temp\\aloofnessQuell.com standby\fine.dat2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\regsvr32.exestandby\fine.dat3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\aloofnessQuell.comFilesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022
-
memory/1132-132-0x0000000000000000-mapping.dmp
-
memory/2280-138-0x0000000000000000-mapping.dmp
-
memory/2280-140-0x0000000000550000-0x0000000000579000-memory.dmpFilesize
164KB
-
memory/2280-141-0x0000000000550000-0x0000000000579000-memory.dmpFilesize
164KB
-
memory/4032-134-0x0000000000000000-mapping.dmp
-
memory/4032-135-0x0000000003200000-0x0000000003229000-memory.dmpFilesize
164KB
-
memory/4032-136-0x00000000031A0000-0x00000000031C9000-memory.dmpFilesize
164KB
-
memory/4032-137-0x0000000003200000-0x0000000003229000-memory.dmpFilesize
164KB
-
memory/4032-139-0x0000000003200000-0x0000000003229000-memory.dmpFilesize
164KB