Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
22-11-2022 16:53
Static task
static1
General
-
Target
CL.lnk
-
Size
1KB
-
MD5
7d82b0c9baf5165ad9f2da1015f35310
-
SHA1
e81bbc1d79eedd5b00a423dde28826716c38e326
-
SHA256
1bd2c7e0204b957470fa5f955a22b9a7bf905e23f41acbcc83a4ec08b922f1c1
-
SHA512
f40e1c7ec6018f60590c73d37c7ec88807ba6e11fddbb503c036432fcdb7b7ecef23f4ccef252705a5c5e71d22282ca9ca55fb63e4efa87c6d4efbbd9a9747b6
Malware Config
Extracted
qakbot
404.27
BB06
1668418916
24.142.218.202:443
152.170.17.136:443
90.104.22.28:2222
24.64.114.59:61202
86.225.214.138:2222
92.27.86.48:2222
70.120.228.205:2083
24.206.27.39:443
27.99.45.237:2222
105.103.27.80:32103
170.253.25.35:443
24.64.114.59:2222
92.207.132.174:2222
86.133.237.3:443
172.117.139.142:995
108.6.249.139:443
92.239.81.124:443
86.129.13.128:2222
47.34.30.133:443
86.148.55.111:443
94.63.65.146:443
24.64.114.59:3389
184.153.132.82:443
74.66.134.24:443
83.11.84.105:2222
105.184.161.242:443
82.121.237.106:2222
112.141.184.246:995
91.165.188.74:50000
91.180.68.95:2222
188.4.196.132:995
88.171.156.150:50000
83.7.56.214:443
75.99.125.238:2222
105.103.27.80:990
62.35.67.88:443
105.103.27.80:2078
62.31.130.138:465
87.220.205.14:2222
193.3.19.137:443
73.36.196.11:443
24.116.45.121:443
2.84.98.228:2222
50.68.204.71:443
85.59.61.52:2222
58.247.115.126:995
180.151.104.143:443
212.251.122.147:995
100.16.107.117:443
24.49.232.96:443
174.77.209.5:443
157.231.42.190:443
73.165.119.20:443
213.91.235.146:443
87.223.88.205:443
90.221.5.105:443
50.68.204.71:995
79.37.204.67:443
98.145.23.67:443
86.171.75.63:443
76.68.34.167:2222
41.109.78.231:995
24.49.232.96:995
93.24.192.142:20
186.188.80.154:443
89.129.109.27:2222
213.67.255.57:2222
92.185.204.18:2078
92.137.74.174:2222
78.69.251.252:2222
190.24.45.24:995
92.106.70.62:2222
109.11.175.42:2222
24.28.121.122:443
78.253.154.211:50000
81.111.108.123:443
78.92.133.215:443
76.127.192.23:443
149.126.159.224:443
77.126.81.208:443
105.103.27.80:22
81.159.252.167:2222
94.60.141.48:995
75.143.236.149:443
110.4.255.247:443
170.249.59.153:443
75.98.154.19:443
173.239.94.212:443
176.142.207.63:443
87.202.101.164:50000
151.32.168.124:443
74.92.243.113:50000
31.190.68.212:443
85.74.158.150:2222
24.64.114.59:2078
69.133.162.35:443
84.35.26.14:995
174.104.184.149:443
136.232.184.134:995
68.47.128.161:443
50.68.204.71:993
87.65.160.87:995
200.233.108.153:995
206.1.223.209:2087
109.152.70.207:50000
174.45.15.123:443
81.229.117.95:2222
47.41.154.250:443
72.82.136.90:443
88.126.94.4:50000
89.240.102.164:995
190.18.236.175:443
175.205.2.54:443
82.127.174.33:2222
24.228.132.224:2222
174.101.111.4:443
91.169.12.198:32100
157.231.42.190:995
74.33.84.227:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
regsvr32.exepid process 348 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 348 regsvr32.exe 348 regsvr32.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe 4884 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 348 regsvr32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
cmd.execmd.execmd.exeregsvr32.exedescription pid process target process PID 2692 wrote to memory of 3792 2692 cmd.exe cmd.exe PID 2692 wrote to memory of 3792 2692 cmd.exe cmd.exe PID 2692 wrote to memory of 3792 2692 cmd.exe cmd.exe PID 3792 wrote to memory of 4696 3792 cmd.exe cmd.exe PID 3792 wrote to memory of 4696 3792 cmd.exe cmd.exe PID 3792 wrote to memory of 4696 3792 cmd.exe cmd.exe PID 4696 wrote to memory of 2160 4696 cmd.exe replace.exe PID 4696 wrote to memory of 2160 4696 cmd.exe replace.exe PID 4696 wrote to memory of 2160 4696 cmd.exe replace.exe PID 4696 wrote to memory of 348 4696 cmd.exe regsvr32.exe PID 4696 wrote to memory of 348 4696 cmd.exe regsvr32.exe PID 4696 wrote to memory of 348 4696 cmd.exe regsvr32.exe PID 348 wrote to memory of 4884 348 regsvr32.exe wermgr.exe PID 348 wrote to memory of 4884 348 regsvr32.exe wermgr.exe PID 348 wrote to memory of 4884 348 regsvr32.exe wermgr.exe PID 348 wrote to memory of 4884 348 regsvr32.exe wermgr.exe PID 348 wrote to memory of 4884 348 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CL.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /q /c drab\octupling.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K drab\charring.cmd system regsv3⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\replace.exereplace C:\Windows\\system32\\regsvr32.exe C:\Users\Admin\AppData\Local\Temp /A4⤵PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\regsvr32.exeregsvr32.exe /i /s drab\\grouts.tmp4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD56cab3a2319f53bebabbd57f2bbefc392
SHA1ab13317a13ca27435d8fc9fc950e7234a8169873
SHA25662ec2017a419d26d687e909c994269d4480cfdddde664b10cd369fbc9814f2ad
SHA5122345de8d240a5c8b73bf1735cb7cf8861e6c8fed2f71cdcaf5c37e96565915b6bb3a38747ba3234c95303545e1d29358d70f246854af8d3f6ea116cf6d1eb90b
-
Filesize
20KB
MD56cab3a2319f53bebabbd57f2bbefc392
SHA1ab13317a13ca27435d8fc9fc950e7234a8169873
SHA25662ec2017a419d26d687e909c994269d4480cfdddde664b10cd369fbc9814f2ad
SHA5122345de8d240a5c8b73bf1735cb7cf8861e6c8fed2f71cdcaf5c37e96565915b6bb3a38747ba3234c95303545e1d29358d70f246854af8d3f6ea116cf6d1eb90b