Analysis
-
max time kernel
150s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 17:10
Static task
static1
Behavioral task
behavioral1
Sample
CO.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
CO.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
judicature/contaminative.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
judicature/contaminative.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
judicature/lent.cmd
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
judicature/lent.cmd
Resource
win10v2004-20220812-en
General
-
Target
CO.lnk
-
Size
1KB
-
MD5
43e43289434b4c7417b35852b44cc845
-
SHA1
bf0f63fb380513d62e9e54023c93e12d6a820c4d
-
SHA256
3e3c759889176ac1291cbef34ad7b22d2943ad2f2d082937420c849eb4ce44f2
-
SHA512
0348ce73a1feba8c738546adceaa57ed84fd444338772ef82e3c0deaecce93fb1b464535d4f2d21a4c4b7800a903c864b1fb9421a830fc66972974cc3c5b36ee
Malware Config
Extracted
qakbot
404.14
BB05
1667208557
174.77.209.5:443
187.0.1.74:23795
24.206.27.39:443
1.156.220.169:30723
156.216.39.119:995
58.186.75.42:443
1.156.197.160:30467
187.1.1.190:4844
186.18.210.16:443
1.181.56.171:771
90.165.109.4:2222
187.0.1.186:39742
87.57.13.215:443
187.0.1.207:52344
227.26.3.227:1
98.207.190.55:443
187.0.1.197:7017
188.49.56.189:443
102.156.160.115:443
187.0.1.24:17751
70.51.139.148:2222
187.0.1.109:34115
14.164.18.210:443
187.0.1.97:30597
205.161.22.189:443
187.0.1.151:54711
196.217.63.248:443
187.0.1.160:45243
66.37.239.222:443
24.207.97.40:443
187.0.1.59:24056
68.62.199.70:443
45.230.169.132:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1656 rectanglesJamming.com -
Loads dropped DLL 1 IoCs
pid Process 1724 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1068 regsvr32.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe 1548 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1068 regsvr32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1724 1376 cmd.exe 27 PID 1376 wrote to memory of 1724 1376 cmd.exe 27 PID 1376 wrote to memory of 1724 1376 cmd.exe 27 PID 1724 wrote to memory of 1656 1724 cmd.exe 28 PID 1724 wrote to memory of 1656 1724 cmd.exe 28 PID 1724 wrote to memory of 1656 1724 cmd.exe 28 PID 1656 wrote to memory of 1068 1656 rectanglesJamming.com 29 PID 1656 wrote to memory of 1068 1656 rectanglesJamming.com 29 PID 1656 wrote to memory of 1068 1656 rectanglesJamming.com 29 PID 1656 wrote to memory of 1068 1656 rectanglesJamming.com 29 PID 1656 wrote to memory of 1068 1656 rectanglesJamming.com 29 PID 1656 wrote to memory of 1068 1656 rectanglesJamming.com 29 PID 1656 wrote to memory of 1068 1656 rectanglesJamming.com 29 PID 1068 wrote to memory of 1548 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1548 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1548 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1548 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1548 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1548 1068 regsvr32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CO.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c judicature\lent.cmd reg2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\rectanglesJamming.comC:\Users\Admin\AppData\Local\Temp\\rectanglesJamming.com judicature\contaminative.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\regsvr32.exejudicature\contaminative.dat4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198