Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
CO.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
CO.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
judicature/contaminative.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
judicature/contaminative.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
judicature/lent.cmd
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
judicature/lent.cmd
Resource
win10v2004-20220812-en
General
-
Target
CO.lnk
-
Size
1KB
-
MD5
43e43289434b4c7417b35852b44cc845
-
SHA1
bf0f63fb380513d62e9e54023c93e12d6a820c4d
-
SHA256
3e3c759889176ac1291cbef34ad7b22d2943ad2f2d082937420c849eb4ce44f2
-
SHA512
0348ce73a1feba8c738546adceaa57ed84fd444338772ef82e3c0deaecce93fb1b464535d4f2d21a4c4b7800a903c864b1fb9421a830fc66972974cc3c5b36ee
Malware Config
Extracted
qakbot
404.14
BB05
1667208557
174.77.209.5:443
187.0.1.74:23795
24.206.27.39:443
1.156.220.169:30723
156.216.39.119:995
58.186.75.42:443
1.156.197.160:30467
187.1.1.190:4844
186.18.210.16:443
1.181.56.171:771
90.165.109.4:2222
187.0.1.186:39742
87.57.13.215:443
187.0.1.207:52344
227.26.3.227:1
98.207.190.55:443
187.0.1.197:7017
188.49.56.189:443
102.156.160.115:443
187.0.1.24:17751
70.51.139.148:2222
187.0.1.109:34115
14.164.18.210:443
187.0.1.97:30597
205.161.22.189:443
187.0.1.151:54711
196.217.63.248:443
187.0.1.160:45243
66.37.239.222:443
24.207.97.40:443
187.0.1.59:24056
68.62.199.70:443
45.230.169.132:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 888 rectanglesJamming.com -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1148 regsvr32.exe 1148 regsvr32.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe 2788 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1148 regsvr32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4492 4380 cmd.exe 79 PID 4380 wrote to memory of 4492 4380 cmd.exe 79 PID 4492 wrote to memory of 888 4492 cmd.exe 80 PID 4492 wrote to memory of 888 4492 cmd.exe 80 PID 888 wrote to memory of 1148 888 rectanglesJamming.com 81 PID 888 wrote to memory of 1148 888 rectanglesJamming.com 81 PID 888 wrote to memory of 1148 888 rectanglesJamming.com 81 PID 1148 wrote to memory of 2788 1148 regsvr32.exe 82 PID 1148 wrote to memory of 2788 1148 regsvr32.exe 82 PID 1148 wrote to memory of 2788 1148 regsvr32.exe 82 PID 1148 wrote to memory of 2788 1148 regsvr32.exe 82 PID 1148 wrote to memory of 2788 1148 regsvr32.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CO.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c judicature\lent.cmd reg2⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\rectanglesJamming.comC:\Users\Admin\AppData\Local\Temp\\rectanglesJamming.com judicature\contaminative.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\regsvr32.exejudicature\contaminative.dat4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5b0c2fa35d14a9fad919e99d9d75e1b9e
SHA18d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
SHA512a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022