Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31/10/2022, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
DV.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DV.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
selectable/monotonously.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
selectable/monotonously.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
selectable/resourceful.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
selectable/resourceful.cmd
Resource
win10v2004-20220812-en
General
-
Target
DV.lnk
-
Size
1KB
-
MD5
76dda719c2dd44a2c726dfde065f6ba2
-
SHA1
c13dea5129ec9baa332a0bbe702818e8a1b2f1fb
-
SHA256
f4d644818e0f129317faa0ecf64186753604c38bd342da4dca57be728bd93725
-
SHA512
91a56709d3172f1ddbe0e83b168b2b47c31beea557a94e660183ac62d2175fd3823adcff6b01fdbbafdb3633caa689b2de6c2148ed87ac0add16a4eb39826bc5
Malware Config
Extracted
qakbot
404.14
BB05
1667208499
174.77.209.5:443
187.0.1.74:23795
24.206.27.39:443
1.156.220.169:30723
156.216.39.119:995
58.186.75.42:443
1.156.197.160:30467
187.1.1.190:4844
186.18.210.16:443
1.181.56.171:771
90.165.109.4:2222
187.0.1.186:39742
87.57.13.215:443
187.0.1.207:52344
227.26.3.227:1
98.207.190.55:443
187.0.1.197:7017
188.49.56.189:443
102.156.160.115:443
187.0.1.24:17751
70.51.139.148:2222
187.0.1.109:34115
14.164.18.210:443
187.0.1.97:30597
205.161.22.189:443
187.0.1.151:54711
196.217.63.248:443
187.0.1.160:45243
66.37.239.222:443
24.207.97.40:443
187.0.1.59:24056
68.62.199.70:443
45.230.169.132:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1788 overreactConstrain.com -
Loads dropped DLL 1 IoCs
pid Process 952 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1068 regsvr32.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe 1364 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1068 regsvr32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 368 wrote to memory of 952 368 cmd.exe 27 PID 368 wrote to memory of 952 368 cmd.exe 27 PID 368 wrote to memory of 952 368 cmd.exe 27 PID 952 wrote to memory of 1788 952 cmd.exe 28 PID 952 wrote to memory of 1788 952 cmd.exe 28 PID 952 wrote to memory of 1788 952 cmd.exe 28 PID 1788 wrote to memory of 1068 1788 overreactConstrain.com 29 PID 1788 wrote to memory of 1068 1788 overreactConstrain.com 29 PID 1788 wrote to memory of 1068 1788 overreactConstrain.com 29 PID 1788 wrote to memory of 1068 1788 overreactConstrain.com 29 PID 1788 wrote to memory of 1068 1788 overreactConstrain.com 29 PID 1788 wrote to memory of 1068 1788 overreactConstrain.com 29 PID 1788 wrote to memory of 1068 1788 overreactConstrain.com 29 PID 1068 wrote to memory of 1364 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1364 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1364 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1364 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1364 1068 regsvr32.exe 30 PID 1068 wrote to memory of 1364 1068 regsvr32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DV.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c selectable\resourceful.cmd reg2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\overreactConstrain.comC:\Users\Admin\AppData\Local\Temp\\overreactConstrain.com selectable\monotonously.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\regsvr32.exeselectable\monotonously.dat4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198