Analysis
-
max time kernel
305s -
max time network
224s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
DV_9513.iso
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
DV.lnk
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
selectable/embalmer.cmd
Resource
win10-20220901-en
General
-
Target
DV.lnk
-
Size
1KB
-
MD5
cfc2c6be0247c15708ee077d293956c4
-
SHA1
6b2c2bc858149a1af62ae414d4fbebb9d4ecb966
-
SHA256
5ff465cd23c117c77714927839880e588a27cd933222d9e26f39507d09e53dbf
-
SHA512
aeb4bae560b31d514cdffc0f9b52c1e58e9de0bfce51fd431431ddb2e4347047f3bba578a10dba5f7a3c6483a90af3f0b74dc13a2dd1bda07c422e8915e8708a
Malware Config
Extracted
qakbot
404.14
BB05
1667208499
174.77.209.5:443
187.0.1.74:23795
24.206.27.39:443
1.156.220.169:30723
156.216.39.119:995
58.186.75.42:443
1.156.197.160:30467
187.1.1.190:4844
186.18.210.16:443
1.181.56.171:771
90.165.109.4:2222
187.0.1.186:39742
87.57.13.215:443
187.0.1.207:52344
227.26.3.227:1
98.207.190.55:443
187.0.1.197:7017
188.49.56.189:443
102.156.160.115:443
187.0.1.24:17751
70.51.139.148:2222
187.0.1.109:34115
14.164.18.210:443
187.0.1.97:30597
205.161.22.189:443
187.0.1.151:54711
196.217.63.248:443
187.0.1.160:45243
66.37.239.222:443
24.207.97.40:443
187.0.1.59:24056
68.62.199.70:443
45.230.169.132:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2748 shelteredHonorariums.com 1036 shelteredHonorariums.com 1984 shelteredHonorariums.com 1568 shelteredHonorariums.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3288 regsvr32.exe 3288 regsvr32.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe 4912 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3288 regsvr32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2712 2356 cmd.exe 67 PID 2356 wrote to memory of 2712 2356 cmd.exe 67 PID 2712 wrote to memory of 2748 2712 cmd.exe 68 PID 2712 wrote to memory of 2748 2712 cmd.exe 68 PID 2748 wrote to memory of 3288 2748 shelteredHonorariums.com 69 PID 2748 wrote to memory of 3288 2748 shelteredHonorariums.com 69 PID 2748 wrote to memory of 3288 2748 shelteredHonorariums.com 69 PID 3288 wrote to memory of 4912 3288 regsvr32.exe 70 PID 3288 wrote to memory of 4912 3288 regsvr32.exe 70 PID 3288 wrote to memory of 4912 3288 regsvr32.exe 70 PID 3288 wrote to memory of 4912 3288 regsvr32.exe 70 PID 3288 wrote to memory of 4912 3288 regsvr32.exe 70 PID 304 wrote to memory of 1036 304 cmd.exe 80 PID 304 wrote to memory of 1036 304 cmd.exe 80 PID 1640 wrote to memory of 1984 1640 cmd.exe 83 PID 1640 wrote to memory of 1984 1640 cmd.exe 83 PID 1984 wrote to memory of 1064 1984 shelteredHonorariums.com 84 PID 1984 wrote to memory of 1064 1984 shelteredHonorariums.com 84 PID 1984 wrote to memory of 1064 1984 shelteredHonorariums.com 84
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DV.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c selectable\embalmer.cmd reg2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\shelteredHonorariums.comC:\Users\Admin\AppData\Local\Temp\\shelteredHonorariums.com selectable\pulsars.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\regsvr32.exeselectable\pulsars.dat4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\selectable\embalmer.cmd" "1⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\shelteredHonorariums.comC:\Users\Admin\AppData\Local\Temp\\shelteredHonorariums.com selectable\pulsars.dat2⤵
- Executes dropped EXE
PID:1036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c selectable\embalmer.cmd reg1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\shelteredHonorariums.comC:\Users\Admin\AppData\Local\Temp\\shelteredHonorariums.com selectable\pulsars.dat2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\regsvr32.exeselectable\pulsars.dat3⤵PID:1064
-
-
-
C:\Users\Admin\AppData\Local\Temp\shelteredHonorariums.com"C:\Users\Admin\AppData\Local\Temp\shelteredHonorariums.com"1⤵
- Executes dropped EXE
PID:1568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54e0db1a476c3aa5acb7260520b782e10
SHA13076999a576fc02d0c9ec927a1803937e8bb7a9c
SHA256ffe342138e54568a0c5b38a767ce0cb1071f2c53b999d9620732750210f50b96
SHA512013e3c916e5aaf3acff235876de065f90d1924e58857bba6979baefec37e8bf5a3121a7320605b352c30c2abe499431a5c981faf486f791cf29e5dbbfacfd6a8
-
Filesize
23KB
MD5a8819a40562f8afe1ea5a24d4fafea5d
SHA1c5da393b44176770471a8d6b9324eb387046f52b
SHA256cec94c3829884bdf1d35ea3e02988c748c0f6881819719242605e3c5f531fffc
SHA512a4673f9ab8017277723a5486f15da54e6d7a025f0e0eff9355ceb72bde151054ee299af4fb83a3ebe01dba3db3f56abee3a13854a2272099b6f263fb118dab19
-
Filesize
23KB
MD5a8819a40562f8afe1ea5a24d4fafea5d
SHA1c5da393b44176770471a8d6b9324eb387046f52b
SHA256cec94c3829884bdf1d35ea3e02988c748c0f6881819719242605e3c5f531fffc
SHA512a4673f9ab8017277723a5486f15da54e6d7a025f0e0eff9355ceb72bde151054ee299af4fb83a3ebe01dba3db3f56abee3a13854a2272099b6f263fb118dab19
-
Filesize
23KB
MD5a8819a40562f8afe1ea5a24d4fafea5d
SHA1c5da393b44176770471a8d6b9324eb387046f52b
SHA256cec94c3829884bdf1d35ea3e02988c748c0f6881819719242605e3c5f531fffc
SHA512a4673f9ab8017277723a5486f15da54e6d7a025f0e0eff9355ceb72bde151054ee299af4fb83a3ebe01dba3db3f56abee3a13854a2272099b6f263fb118dab19
-
Filesize
23KB
MD5a8819a40562f8afe1ea5a24d4fafea5d
SHA1c5da393b44176770471a8d6b9324eb387046f52b
SHA256cec94c3829884bdf1d35ea3e02988c748c0f6881819719242605e3c5f531fffc
SHA512a4673f9ab8017277723a5486f15da54e6d7a025f0e0eff9355ceb72bde151054ee299af4fb83a3ebe01dba3db3f56abee3a13854a2272099b6f263fb118dab19