Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2022, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
Details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
alphabetical/histories.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
alphabetical/histories.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
alphabetical/provenance.dll
Resource
win7-20220812-en
General
-
Target
Details.lnk
-
Size
1KB
-
MD5
42e2185e08761d42775f2a89aaf827fd
-
SHA1
0c276a0dc6c1a35270123cdd97f504de5ebb40ce
-
SHA256
cb5e60973a355414dbe266f111e597afeaa0f92e44409c87dcb5facae1828594
-
SHA512
c4ec4227e01fea963d8f0b9b0ae776e22b76980b607267bbd6e58a75e80f7d7768fbfa920a4756543c025e324806c275597c26b8e3702e4ef09fd6ce47f6434b
Malware Config
Extracted
qakbot
403.1051
BB04
1666776497
197.204.53.242:443
83.244.63.21:443
27.110.134.202:995
173.49.74.62:443
181.164.194.228:443
24.116.45.121:443
41.47.249.185:443
24.206.27.39:443
113.183.223.8:443
186.188.80.134:443
64.207.237.118:443
156.216.134.70:995
58.247.115.126:995
180.151.116.67:443
41.140.63.187:443
144.202.15.58:443
190.199.97.108:993
172.117.139.142:995
45.230.169.132:995
24.9.220.167:443
190.24.45.24:995
193.3.19.137:443
201.68.209.47:32101
68.62.199.70:443
167.58.254.85:443
156.197.230.148:995
175.205.2.54:443
200.233.108.153:995
105.106.60.149:443
102.159.110.79:995
2.88.206.121:443
190.193.180.228:443
216.131.22.236:995
190.37.174.11:2222
206.1.203.0:443
186.188.96.197:443
190.74.248.136:443
206.1.128.203:443
201.249.100.208:995
190.33.241.216:443
190.75.151.66:2222
198.2.51.242:993
90.165.109.4:2222
71.199.168.185:443
181.56.171.3:995
41.103.1.16:443
24.207.97.117:443
105.157.86.118:443
201.223.169.238:32100
47.14.229.4:443
70.60.142.214:2222
142.181.183.42:2222
41.62.165.152:443
41.97.205.96:443
41.97.14.60:443
151.213.183.141:995
75.84.234.68:443
186.18.210.16:443
41.96.204.196:443
64.123.103.123:443
186.48.174.77:995
152.170.17.136:443
160.176.151.70:995
78.179.135.247:443
191.33.187.192:2222
98.207.190.55:443
196.65.217.253:995
78.50.124.220:443
91.171.72.214:32100
186.154.189.162:995
101.109.44.197:995
97.92.4.205:8443
41.36.159.36:993
70.115.104.126:443
181.44.34.172:443
88.240.75.201:443
24.130.228.100:443
41.109.228.108:995
24.177.111.153:443
60.54.65.27:443
189.129.38.158:2222
190.203.51.133:2222
96.46.230.10:443
222.117.141.133:443
190.207.137.189:2222
208.78.220.120:443
105.108.223.181:443
41.104.155.245:443
65.140.11.170:443
184.159.76.47:443
105.98.223.169:443
197.0.225.39:443
41.101.193.38:443
105.155.151.29:995
196.207.146.151:443
190.37.112.223:2222
14.54.83.15:443
93.156.96.171:443
58.186.75.42:443
189.110.3.60:2222
186.18.77.99:443
41.107.78.169:443
149.126.159.224:443
156.196.169.222:443
190.100.149.122:995
1.0.215.176:443
202.5.53.143:443
206.1.199.156:2087
102.156.162.83:443
220.134.54.185:2222
88.132.109.147:443
190.29.228.61:443
41.101.183.90:443
94.36.5.31:443
102.184.30.42:443
102.187.63.127:995
190.33.87.140:443
187.198.16.39:443
62.46.231.64:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4620 regsvr32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4180 regsvr32.exe 4180 regsvr32.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe 3976 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4180 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3624 1856 cmd.exe 83 PID 1856 wrote to memory of 3624 1856 cmd.exe 83 PID 3624 wrote to memory of 2116 3624 cmd.exe 84 PID 3624 wrote to memory of 2116 3624 cmd.exe 84 PID 3624 wrote to memory of 4620 3624 cmd.exe 85 PID 3624 wrote to memory of 4620 3624 cmd.exe 85 PID 4620 wrote to memory of 4180 4620 regsvr32.exe 86 PID 4620 wrote to memory of 4180 4620 regsvr32.exe 86 PID 4620 wrote to memory of 4180 4620 regsvr32.exe 86 PID 4180 wrote to memory of 3976 4180 regsvr32.exe 87 PID 4180 wrote to memory of 3976 4180 regsvr32.exe 87 PID 4180 wrote to memory of 3976 4180 regsvr32.exe 87 PID 4180 wrote to memory of 3976 4180 regsvr32.exe 87 PID 4180 wrote to memory of 3976 4180 regsvr32.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Details.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c alphabetical\histories.cmd vr 32. exe2⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\replace.exereplace C:\Windows\\system32\\regsvr32.exe C:\Users\Admin\AppData\Local\Temp /A3⤵PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\regsvr32.exeregsvr32.exe alphabetical\provenance.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\regsvr32.exealphabetical\provenance.dat4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022