Analysis
-
max time kernel
187s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
Details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
disallowable/expectorant.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
disallowable/expectorant.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
disallowable/precondition.cmd
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
disallowable/precondition.cmd
Resource
win10v2004-20220812-en
General
-
Target
Details.lnk
-
Size
1KB
-
MD5
23142f4050cfad38e20d0043c76836fc
-
SHA1
4693a89acfaebbdd72a26a85d75f0ce05d67354e
-
SHA256
870658ffc670b3da2bc4c55bd9ae84a6b6220ae64845a84ed077837d76c2719e
-
SHA512
3b03e2515f044479162c3dfc3c81a3982caf7a18a1249c782764b2b17ad4b74a0f300303dd90cb01e106104bcf1bb1b61074dc95e0af0f1f790abacf673a2a9c
Malware Config
Extracted
qakbot
404.2
BB04
1666863946
27.110.134.202:995
1.156.220.47:17155
186.188.80.134:443
1.190.199.101:9480
187.1.1.181:42178
118.200.83.226:443
187.0.1.144:51727
193.3.19.137:443
1.201.68.209:12157
188.49.56.189:443
187.0.1.14:58271
190.74.248.136:443
201.210.92.3:2222
187.0.1.105:40325
64.123.103.123:443
41.97.169.44:443
72.88.245.71:443
187.0.1.45:59049
41.100.163.127:443
187.0.1.83:62527
175.205.2.54:443
187.0.1.201:63844
71.199.168.185:443
187.0.1.105:40278
186.18.210.16:443
101.109.44.197:995
187.0.1.181:11298
24.177.111.153:443
184.159.76.47:443
187.0.1.105:39831
93.156.96.171:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2332 regsvr32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5092 regsvr32.exe 5092 regsvr32.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe 1028 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5092 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4264 2324 cmd.exe 82 PID 2324 wrote to memory of 4264 2324 cmd.exe 82 PID 4264 wrote to memory of 220 4264 cmd.exe 83 PID 4264 wrote to memory of 220 4264 cmd.exe 83 PID 4264 wrote to memory of 2332 4264 cmd.exe 84 PID 4264 wrote to memory of 2332 4264 cmd.exe 84 PID 2332 wrote to memory of 5092 2332 regsvr32.exe 85 PID 2332 wrote to memory of 5092 2332 regsvr32.exe 85 PID 2332 wrote to memory of 5092 2332 regsvr32.exe 85 PID 5092 wrote to memory of 1028 5092 regsvr32.exe 86 PID 5092 wrote to memory of 1028 5092 regsvr32.exe 86 PID 5092 wrote to memory of 1028 5092 regsvr32.exe 86 PID 5092 wrote to memory of 1028 5092 regsvr32.exe 86 PID 5092 wrote to memory of 1028 5092 regsvr32.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Details.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c disallowable\precondition.cmd r3 2.e xe2⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\system32\replace.exereplace C:\Windows\system32\regsvr32.exe C:\Users\Admin\AppData\Local\Temp /A3⤵PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\regsvr32.exeregsvr32.exe disallowable\expectorant.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\regsvr32.exedisallowable\expectorant.dat4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022