Analysis
-
max time kernel
304s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 03:09
Behavioral task
behavioral1
Sample
fwpolicyiomgr.dll
Resource
win7-20221111-en
General
-
Target
fwpolicyiomgr.dll
-
Size
156KB
-
MD5
50ec7cac279ae9cc639f3bc220c6d9b3
-
SHA1
4511601a140a0e78c83ee80538920a8a4bf609f8
-
SHA256
5fb5b0c19b5cd855ce353df538c35dab7f74a1d00f2dbe2ccf06853b150e0dd6
-
SHA512
acff6845e6987b4dfc18b18365c3e31eec2954b8df37b06bda72bbe9d5c408923d2b09ae5f8d01a85b03442ea80a46a49c93686763ccc16f5da768602334c2a6
-
SSDEEP
3072:7bLJEsAXBFa2MAnJuXTx/TBf5cy30O/ya:HFJAXBjJnJqTx/TBxb3f/
Malware Config
Extracted
qakbot
403.1051
BB04
1666604608
222.117.141.133:443
198.2.51.242:993
27.110.134.202:995
172.117.139.142:995
144.202.15.58:443
193.3.19.137:443
208.78.220.120:443
45.230.169.132:995
102.157.250.192:995
93.156.96.171:443
41.109.170.156:995
58.247.115.126:995
200.233.108.153:995
197.204.107.51:443
201.68.209.47:32101
156.220.185.41:993
37.8.67.5:443
181.164.194.228:443
156.197.230.148:995
175.205.2.54:443
105.111.102.145:443
156.217.185.90:995
2.88.206.121:443
58.186.75.42:443
189.110.3.60:2222
190.33.241.216:443
190.207.137.189:2222
105.98.89.54:443
190.74.248.136:443
189.129.38.158:2222
190.193.180.228:443
200.109.204.20:2222
105.111.81.57:443
190.27.103.174:995
206.1.175.95:443
167.58.254.85:443
160.176.137.80:443
41.98.239.92:443
186.18.77.99:443
90.165.109.4:2222
41.107.78.169:443
105.158.78.156:443
197.0.161.64:443
149.126.159.224:443
201.208.58.92:2222
78.179.135.247:443
156.196.169.222:443
196.207.146.151:443
190.100.149.122:995
201.210.121.95:993
1.0.215.176:443
125.25.73.17:995
202.5.53.143:443
206.1.254.89:2087
102.156.162.83:443
220.134.54.185:2222
190.37.174.11:2222
176.241.48.177:443
190.29.228.61:443
72.217.105.238:443
186.188.80.134:443
41.98.4.251:443
41.101.183.90:443
94.36.5.31:443
41.100.133.221:443
41.108.69.247:443
102.184.30.42:443
102.187.63.127:995
190.33.87.140:443
187.198.16.39:443
62.46.231.64:443
186.18.210.16:443
42.116.54.220:443
197.244.204.128:443
190.203.106.109:2222
200.155.61.245:995
200.155.61.245:443
160.177.168.51:995
105.105.46.239:443
78.162.135.45:443
200.233.108.153:993
41.143.109.111:61202
91.171.72.214:32100
197.58.185.117:443
136.232.184.134:995
186.52.96.202:995
163.182.177.80:443
113.170.217.46:443
167.56.53.143:995
181.141.3.126:443
189.216.29.135:443
191.84.65.116:443
196.65.123.130:995
152.170.17.136:443
186.213.214.13:2222
216.131.22.236:995
98.207.190.55:443
186.14.70.229:443
70.173.248.13:443
41.103.187.192:443
197.253.237.2:443
206.1.212.194:443
14.54.83.15:443
103.156.237.170:443
190.206.95.220:2222
181.168.145.94:443
139.190.173.215:443
188.236.139.240:3389
62.11.227.146:443
216.106.216.209:443
207.204.120.40:443
41.103.173.10:443
197.145.137.210:995
102.185.86.69:995
85.100.25.99:443
14.246.151.175:443
41.105.5.123:443
72.88.245.71:443
41.228.249.243:995
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4704 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 4824 regsvr32.exe 4824 regsvr32.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe 1792 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 4824 regsvr32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 392 wrote to memory of 4824 392 regsvr32.exe regsvr32.exe PID 392 wrote to memory of 4824 392 regsvr32.exe regsvr32.exe PID 392 wrote to memory of 4824 392 regsvr32.exe regsvr32.exe PID 4824 wrote to memory of 1792 4824 regsvr32.exe wermgr.exe PID 4824 wrote to memory of 1792 4824 regsvr32.exe wermgr.exe PID 4824 wrote to memory of 1792 4824 regsvr32.exe wermgr.exe PID 4824 wrote to memory of 1792 4824 regsvr32.exe wermgr.exe PID 4824 wrote to memory of 1792 4824 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fwpolicyiomgr.dll1⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fwpolicyiomgr.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SplitSelect.ps1xml1⤵
- Opens file in notepad (likely ransom note)
PID:4704