Overview
overview
10Static
static
ContractCopy_RL43.iso
windows7-x64
3ContractCopy_RL43.iso
windows10-2004-x64
3ContractCopy.js
windows7-x64
10ContractCopy.js
windows10-2004-x64
10addled/desertions.dll
windows7-x64
10addled/desertions.dll
windows10-2004-x64
10addled/petrifies.png
windows7-x64
3addled/petrifies.png
windows10-2004-x64
3addled/squawked.png
windows7-x64
3addled/squawked.png
windows10-2004-x64
3addled/volcanic.txt
windows7-x64
1addled/volcanic.txt
windows10-2004-x64
1data.txt
windows7-x64
1data.txt
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 18:07
Static task
static1
Behavioral task
behavioral1
Sample
ContractCopy_RL43.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ContractCopy_RL43.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ContractCopy.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ContractCopy.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
addled/desertions.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
addled/desertions.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
addled/petrifies.png
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
addled/petrifies.png
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
addled/squawked.png
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
addled/squawked.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
addled/volcanic.txt
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
addled/volcanic.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
data.txt
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
data.txt
Resource
win10v2004-20221111-en
General
-
Target
ContractCopy.js
-
Size
9KB
-
MD5
ecabda2f609f2c34789948c6f442213d
-
SHA1
a353a07085b9af5e4f7959233d9686c2a0e536c7
-
SHA256
64e3fca1c24f7c294834f8e1d624c4cafa58446e22bb2cb8641124e862a6347e
-
SHA512
bf09e4ba2d318882f0ebc0027878a21ad068b9f2ad107c697b73b4a5f6127eb10f883ac4920769fb315c4b28444da2a9b321d25685b64cc12c40b107b23c47dd
-
SSDEEP
192:KSLjDJq0Tavgx685UIroAKbP2KTMhS0OGYm5llWVjAvNzAWMuEvk7MgG+r5A6:VVq2k785UIro8KTMhSeYm5P2jiuuEjP4
Malware Config
Extracted
qakbot
404.30
obama222
1668692319
105.184.161.242:443
73.36.196.11:443
82.31.37.241:443
24.116.45.121:443
213.67.255.57:2222
200.93.14.206:2222
188.54.79.88:995
87.220.205.14:2222
72.88.245.71:443
92.137.74.174:2222
91.68.227.219:443
184.153.132.82:443
74.66.134.24:443
47.16.73.77:2222
41.97.183.39:443
177.205.92.100:2222
24.64.114.59:3389
105.111.45.51:995
86.180.222.237:2222
76.184.95.190:993
142.119.40.220:2222
92.27.86.48:2222
180.156.240.239:995
73.230.28.7:443
176.151.15.101:443
24.64.114.59:2222
86.165.15.180:2222
66.191.69.18:995
64.121.161.102:443
50.90.249.161:443
70.115.104.126:995
99.238.106.45:443
72.140.137.221:443
174.77.209.5:443
174.104.184.149:443
2.84.98.228:2222
76.127.192.23:443
50.68.204.71:443
109.11.175.42:2222
199.83.165.233:443
85.59.61.52:2222
85.139.176.42:2222
157.231.42.190:443
85.74.158.150:2222
12.172.173.82:2087
109.152.70.207:50000
12.172.173.82:22
50.68.204.71:995
45.248.169.101:443
76.20.42.45:443
2.8.39.175:2222
81.250.33.243:2222
213.91.235.146:443
136.35.241.159:443
82.121.73.56:2222
173.239.94.212:443
184.20.10.236:443
187.199.224.16:32103
183.82.100.110:2222
102.156.113.77:443
75.99.125.238:2222
82.121.237.106:2222
79.37.204.67:443
85.241.180.94:443
217.128.91.196:2222
12.172.173.82:443
91.180.68.95:2222
98.187.21.2:443
82.9.210.36:443
181.118.183.116:443
174.45.15.123:443
2.83.62.105:443
84.113.121.103:443
77.126.81.208:443
92.106.70.62:2222
12.172.173.82:993
212.251.122.147:995
102.157.69.217:995
69.119.123.159:2222
47.176.30.75:443
87.223.80.45:443
174.60.47.98:443
173.32.181.236:443
41.228.223.122:995
82.36.36.76:443
154.247.94.160:32103
12.172.173.82:50001
12.172.173.82:995
172.90.139.138:2222
86.175.128.143:443
75.143.236.149:443
75.98.154.19:443
81.156.198.115:2222
80.121.8.212:995
103.55.67.180:443
89.152.120.181:443
83.79.150.24:2222
74.92.243.113:50000
87.220.68.51:2222
69.133.162.35:443
80.103.77.44:2222
61.92.123.169:443
74.33.84.227:443
86.225.214.138:2222
80.189.213.49:2222
188.92.64.68:443
109.145.27.139:443
121.122.99.151:995
47.185.141.97:443
81.229.117.95:2222
84.35.26.14:995
68.47.128.161:443
71.31.101.183:443
75.191.246.70:443
41.35.196.18:995
87.65.160.87:995
88.126.94.4:50000
102.158.230.141:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 1564 regsvr32.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe 1164 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 1564 regsvr32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
wscript.exeregsvr32.exeregsvr32.exedescription pid process target process PID 2036 wrote to memory of 1368 2036 wscript.exe regsvr32.exe PID 2036 wrote to memory of 1368 2036 wscript.exe regsvr32.exe PID 2036 wrote to memory of 1368 2036 wscript.exe regsvr32.exe PID 2036 wrote to memory of 1368 2036 wscript.exe regsvr32.exe PID 2036 wrote to memory of 1368 2036 wscript.exe regsvr32.exe PID 1368 wrote to memory of 1564 1368 regsvr32.exe regsvr32.exe PID 1368 wrote to memory of 1564 1368 regsvr32.exe regsvr32.exe PID 1368 wrote to memory of 1564 1368 regsvr32.exe regsvr32.exe PID 1368 wrote to memory of 1564 1368 regsvr32.exe regsvr32.exe PID 1368 wrote to memory of 1564 1368 regsvr32.exe regsvr32.exe PID 1368 wrote to memory of 1564 1368 regsvr32.exe regsvr32.exe PID 1368 wrote to memory of 1564 1368 regsvr32.exe regsvr32.exe PID 1564 wrote to memory of 1164 1564 regsvr32.exe wermgr.exe PID 1564 wrote to memory of 1164 1564 regsvr32.exe wermgr.exe PID 1564 wrote to memory of 1164 1564 regsvr32.exe wermgr.exe PID 1564 wrote to memory of 1164 1564 regsvr32.exe wermgr.exe PID 1564 wrote to memory of 1164 1564 regsvr32.exe wermgr.exe PID 1564 wrote to memory of 1164 1564 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ContractCopy.js1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" addled\desertions.tmp2⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\regsvr32.exeaddled\desertions.tmp3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
-