Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27/10/2022, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
Details.lnk
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
alphabetical/minds.cmd
Resource
win10-20220812-en
General
-
Target
Details.lnk
-
Size
1KB
-
MD5
fc5bc2bb92c5fb2153944fcb5d255fd3
-
SHA1
c92802d6480ec15fadb8f82460d60f7684f823f1
-
SHA256
1ce88481bc2e46aadf6c14d6b94d1394421b47e49fc34f867e08c2b73524763d
-
SHA512
aa57a75444b620d923f1a6852fad7d6522c082038feec15559bee099909a1747c6b179639f0796bb7759a36a6e8990020ef32ae2504c8e87cd0e45beb9915973
Malware Config
Extracted
qakbot
403.1051
BB04
1666776497
197.204.53.242:443
83.244.63.21:443
27.110.134.202:995
173.49.74.62:443
181.164.194.228:443
24.116.45.121:443
41.47.249.185:443
24.206.27.39:443
113.183.223.8:443
186.188.80.134:443
64.207.237.118:443
156.216.134.70:995
58.247.115.126:995
180.151.116.67:443
41.140.63.187:443
144.202.15.58:443
190.199.97.108:993
172.117.139.142:995
45.230.169.132:995
24.9.220.167:443
190.24.45.24:995
193.3.19.137:443
201.68.209.47:32101
68.62.199.70:443
167.58.254.85:443
156.197.230.148:995
175.205.2.54:443
200.233.108.153:995
105.106.60.149:443
102.159.110.79:995
2.88.206.121:443
190.193.180.228:443
216.131.22.236:995
190.37.174.11:2222
206.1.203.0:443
186.188.96.197:443
190.74.248.136:443
206.1.128.203:443
201.249.100.208:995
190.33.241.216:443
190.75.151.66:2222
198.2.51.242:993
90.165.109.4:2222
71.199.168.185:443
181.56.171.3:995
41.103.1.16:443
24.207.97.117:443
105.157.86.118:443
201.223.169.238:32100
47.14.229.4:443
70.60.142.214:2222
142.181.183.42:2222
41.62.165.152:443
41.97.205.96:443
41.97.14.60:443
151.213.183.141:995
75.84.234.68:443
186.18.210.16:443
41.96.204.196:443
64.123.103.123:443
186.48.174.77:995
152.170.17.136:443
160.176.151.70:995
78.179.135.247:443
191.33.187.192:2222
98.207.190.55:443
196.65.217.253:995
78.50.124.220:443
91.171.72.214:32100
186.154.189.162:995
101.109.44.197:995
97.92.4.205:8443
41.36.159.36:993
70.115.104.126:443
181.44.34.172:443
88.240.75.201:443
24.130.228.100:443
41.109.228.108:995
24.177.111.153:443
60.54.65.27:443
189.129.38.158:2222
190.203.51.133:2222
96.46.230.10:443
222.117.141.133:443
190.207.137.189:2222
208.78.220.120:443
105.108.223.181:443
41.104.155.245:443
65.140.11.170:443
184.159.76.47:443
105.98.223.169:443
197.0.225.39:443
41.101.193.38:443
105.155.151.29:995
196.207.146.151:443
190.37.112.223:2222
14.54.83.15:443
93.156.96.171:443
58.186.75.42:443
189.110.3.60:2222
186.18.77.99:443
41.107.78.169:443
149.126.159.224:443
156.196.169.222:443
190.100.149.122:995
1.0.215.176:443
202.5.53.143:443
206.1.199.156:2087
102.156.162.83:443
220.134.54.185:2222
88.132.109.147:443
190.29.228.61:443
41.101.183.90:443
94.36.5.31:443
102.184.30.42:443
102.187.63.127:995
190.33.87.140:443
187.198.16.39:443
62.46.231.64:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5028 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1624 regsvr32.exe 1624 regsvr32.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe 3480 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1624 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4972 wrote to memory of 5008 4972 cmd.exe 68 PID 4972 wrote to memory of 5008 4972 cmd.exe 68 PID 5008 wrote to memory of 4732 5008 cmd.exe 69 PID 5008 wrote to memory of 4732 5008 cmd.exe 69 PID 5008 wrote to memory of 5028 5008 cmd.exe 70 PID 5008 wrote to memory of 5028 5008 cmd.exe 70 PID 5028 wrote to memory of 1624 5028 regsvr32.exe 71 PID 5028 wrote to memory of 1624 5028 regsvr32.exe 71 PID 5028 wrote to memory of 1624 5028 regsvr32.exe 71 PID 1624 wrote to memory of 3480 1624 regsvr32.exe 72 PID 1624 wrote to memory of 3480 1624 regsvr32.exe 72 PID 1624 wrote to memory of 3480 1624 regsvr32.exe 72 PID 1624 wrote to memory of 3480 1624 regsvr32.exe 72 PID 1624 wrote to memory of 3480 1624 regsvr32.exe 72
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Details.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c alphabetical\minds.cmd vr 32. exe2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\replace.exereplace C:\Windows\\system32\\regsvr32.exe C:\Users\Admin\AppData\Local\Temp /A3⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\regsvr32.exeregsvr32.exe alphabetical\unperched.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\regsvr32.exealphabetical\unperched.dat4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5a8819a40562f8afe1ea5a24d4fafea5d
SHA1c5da393b44176770471a8d6b9324eb387046f52b
SHA256cec94c3829884bdf1d35ea3e02988c748c0f6881819719242605e3c5f531fffc
SHA512a4673f9ab8017277723a5486f15da54e6d7a025f0e0eff9355ceb72bde151054ee299af4fb83a3ebe01dba3db3f56abee3a13854a2272099b6f263fb118dab19
-
Filesize
23KB
MD5a8819a40562f8afe1ea5a24d4fafea5d
SHA1c5da393b44176770471a8d6b9324eb387046f52b
SHA256cec94c3829884bdf1d35ea3e02988c748c0f6881819719242605e3c5f531fffc
SHA512a4673f9ab8017277723a5486f15da54e6d7a025f0e0eff9355ceb72bde151054ee299af4fb83a3ebe01dba3db3f56abee3a13854a2272099b6f263fb118dab19