Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2022 22:37
Static task
static1
Behavioral task
behavioral1
Sample
CY67.zip
Resource
win7-20221111-en
General
-
Target
CY67.zip
-
Size
435KB
-
MD5
5d6ef8be97e672979f6c04fd099a2d1d
-
SHA1
b9be124f3a7eae5beaf124f14c55b1538f9de97e
-
SHA256
097c48df84ad79130311c58baf6f53236cfb505ec5b8ec9553b348e99321bdc3
-
SHA512
a3b70c4e5dc5c05a5f459eebb1cc1d2d5d199cbb97efa31fa100fca42974568b93c30b18e2cf2ab4e93dea2b25c78260169b8aafb990fea760d86ea580ee9890
-
SSDEEP
12288:Tf8/GTQsRbziKbUV/RRwlmPquotUS8S1HHvuQJ30VOugU32Z:b4uQsRbvbopRwVbUy1nvuZ32Z
Malware Config
Extracted
qakbot
404.30
BB06
1668670510
86.225.214.138:2222
71.183.236.133:443
182.66.197.35:443
70.66.199.12:443
76.80.180.154:995
180.151.104.143:443
92.149.205.238:2222
83.110.223.247:443
183.87.31.34:443
105.103.50.1:990
103.141.50.117:995
105.103.50.1:465
105.103.50.1:22
86.130.9.167:2222
86.99.15.243:2222
90.104.22.28:2222
172.117.139.142:995
176.142.207.63:443
142.161.27.232:2222
71.247.10.63:50003
108.6.249.139:443
184.176.154.83:995
47.34.30.133:443
71.247.10.63:995
92.207.132.174:2222
89.129.109.27:2222
197.148.17.17:2078
105.111.45.51:995
12.172.173.82:21
87.202.101.164:50000
184.153.132.82:443
74.66.134.24:443
24.64.114.59:3389
73.155.10.79:443
136.232.184.134:995
105.184.161.242:443
2.14.241.33:2222
72.82.136.90:443
73.36.196.11:443
82.31.37.241:443
24.116.45.121:443
213.67.255.57:2222
90.221.5.105:443
66.191.69.18:995
175.205.2.54:443
64.121.161.102:443
41.35.196.18:995
73.230.28.7:443
176.151.15.101:443
24.64.114.59:2222
85.59.61.52:2222
157.231.42.190:443
27.110.134.202:995
49.175.72.56:443
12.172.173.82:2087
12.172.173.82:22
50.68.204.71:995
213.91.235.146:443
174.77.209.5:443
117.186.222.30:993
76.127.192.23:443
50.68.204.71:443
109.11.175.42:2222
199.83.165.233:443
45.248.169.101:443
174.0.224.214:443
151.30.53.233:443
12.172.173.82:443
181.118.183.116:443
174.45.15.123:443
77.126.81.208:443
92.106.70.62:2222
82.121.73.56:2222
173.239.94.212:443
187.199.224.16:32103
183.82.100.110:2222
190.100.149.122:995
41.62.227.225:443
75.99.125.238:2222
2.84.98.228:2222
188.24.223.55:443
79.37.204.67:443
24.228.132.224:2222
69.119.123.159:2222
47.176.30.75:443
174.104.184.149:443
58.247.115.126:995
12.172.173.82:993
102.157.69.217:995
186.52.227.51:995
98.147.155.235:443
173.32.181.236:443
172.90.139.138:2222
75.143.236.149:443
75.98.154.19:443
74.92.243.113:50000
12.172.173.82:995
58.186.75.42:443
105.103.50.1:32103
121.122.99.151:995
12.172.173.82:50001
24.49.232.96:443
85.74.158.150:2222
75.156.125.215:995
68.47.128.161:443
71.31.101.183:443
75.191.246.70:443
80.0.74.165:443
87.65.160.87:995
70.64.77.115:443
81.229.117.95:2222
47.41.154.250:443
174.60.47.98:443
186.88.53.160:2222
84.143.91.238:443
47.185.141.97:443
69.133.162.35:443
84.35.26.14:995
74.33.84.227:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2552 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
regsvr32.exewermgr.exepid process 2552 regsvr32.exe 2552 regsvr32.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe 2348 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 2552 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2880 7zFM.exe Token: 35 2880 7zFM.exe Token: SeSecurityPrivilege 2880 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid process 2880 7zFM.exe 2880 7zFM.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
WScript.exeregsvr32.exeregsvr32.exedescription pid process target process PID 3616 wrote to memory of 2904 3616 WScript.exe regsvr32.exe PID 3616 wrote to memory of 2904 3616 WScript.exe regsvr32.exe PID 2904 wrote to memory of 2552 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 2552 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 2552 2904 regsvr32.exe regsvr32.exe PID 2552 wrote to memory of 2348 2552 regsvr32.exe wermgr.exe PID 2552 wrote to memory of 2348 2552 regsvr32.exe wermgr.exe PID 2552 wrote to memory of 2348 2552 regsvr32.exe wermgr.exe PID 2552 wrote to memory of 2348 2552 regsvr32.exe wermgr.exe PID 2552 wrote to memory of 2348 2552 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\CY67.zip1⤵PID:3624
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2100
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\CY67.img"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2880
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\WW.js"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" animators\messiest.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\regsvr32.exeanimators\messiest.tmp3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD59939ed981f80949de08b32d6383daa66
SHA1ef86148f5ab069eb54a9c7742a9bf5c06fa9ffb1
SHA256116a9ec7461830d99d4ed29418db43e9c1293361b337ea0abe31980406de00e8
SHA5129de8f812284acd1fee7ff1c0e747b491905d0e1895686c718f380dc184f002e7e4dfdac016dd05bcf2b348d2bc2df90558ad493420d44b679a3e7adbc4ae55d5
-
Filesize
835KB
MD5fc28fdaf31c995b7bad98c0fdfe75624
SHA1ed03ff45ef51829fbb1a62b580ce9d2f6b70b785
SHA2566c14b0dc6cf7330dac5faa3a04cabc6f6a63bcc29eef235991593df1bf23d981
SHA512f48c41de2f9e81197eb2b120db10467be12f3dde0960771ba18db0d1b4b631cddcde754e345d33e3b37cfd736cd92f820528d94fe78f6e9ae35973be5c108842
-
Filesize
835KB
MD5fc28fdaf31c995b7bad98c0fdfe75624
SHA1ed03ff45ef51829fbb1a62b580ce9d2f6b70b785
SHA2566c14b0dc6cf7330dac5faa3a04cabc6f6a63bcc29eef235991593df1bf23d981
SHA512f48c41de2f9e81197eb2b120db10467be12f3dde0960771ba18db0d1b4b631cddcde754e345d33e3b37cfd736cd92f820528d94fe78f6e9ae35973be5c108842
-
Filesize
5B
MD52e24e01ec251c8c851897724d3469520
SHA10ddb51524f91c79380fbfaf345437a960c3c2428
SHA256124880061f6255dd7b59b73613ea8d246648be1d34f860b753d4b390c51496d3
SHA512537edd95435d2f2687a6ba41f1006bd96f8b4f2882a03f09103cd4d140df7e6116fe10a44d28dfdcd6598424ed33c16477df905a37ad3dd2e4a03784294fa1ab