Analysis
-
max time kernel
177s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 08:57
Static task
static1
General
-
Target
clowns.zip
-
Size
521KB
-
MD5
d5b6b80e0f49eb42a3795233bbcc4116
-
SHA1
f256f9628270b9148849ce1b4ccf0ae8222fe2d3
-
SHA256
0c2d4e014e92d46b8f5db3aea01886c6d8daabace0b27bef50676d785080621c
-
SHA512
4c4075d8367b4469cc3988fe5a437ed79fe72322427a12e5e83168def47fc83412b31fc06bcb59e24819b55a10631cad5116ccbe8141120541fad037b9a23dd9
-
SSDEEP
12288:WCqTVMB6Wf4FgM6dyXMz9/38ATaZDk7rqVc1W277a0mZPa:TeVjYM6sXG8ATalTio0a0mE
Malware Config
Extracted
qakbot
404.31
BB07
1669135035
41.62.42.255:443
212.54.207.42:995
73.161.176.218:443
50.68.204.71:443
80.103.77.44:2222
24.142.218.202:443
66.191.69.18:995
97.93.192.2:2083
89.115.196.99:443
136.35.241.159:443
194.166.91.255:443
12.172.173.82:22
84.209.52.11:443
50.68.204.71:993
64.228.191.212:2222
46.176.180.15:995
109.218.104.206:2222
91.254.215.167:443
176.151.15.101:443
41.98.228.100:443
157.231.42.190:443
81.156.198.115:2222
85.241.180.94:443
213.91.235.146:443
87.220.68.51:2222
177.97.43.38:2222
190.249.234.250:443
84.113.121.103:443
47.176.30.75:443
197.148.17.17:2078
95.148.179.141:443
173.18.126.3:443
12.172.173.82:993
31.167.227.31:443
77.126.81.208:443
213.191.164.70:443
174.112.25.29:2222
2.83.62.105:443
98.187.21.2:443
173.239.94.212:443
152.170.17.136:443
2.84.98.228:2222
91.165.188.74:50000
24.69.87.61:443
24.64.114.59:2222
73.78.215.104:443
71.46.234.170:443
12.172.173.82:995
76.20.42.45:443
82.121.237.106:2222
69.119.123.159:2222
73.155.10.79:443
98.147.155.235:443
174.104.184.149:443
64.127.146.153:443
158.62.157.184:443
201.245.249.101:995
75.143.236.149:443
84.219.213.130:2222
217.128.91.196:2222
74.92.243.113:50000
86.225.214.138:2222
71.183.236.133:443
121.122.99.151:995
47.229.96.60:443
80.189.213.49:2222
12.172.173.82:465
78.69.251.252:2222
24.9.220.167:443
92.239.81.124:443
50.90.249.161:443
89.152.120.181:443
73.22.121.210:443
82.9.210.36:443
86.186.178.18:443
87.65.160.87:995
105.109.163.112:465
47.41.154.250:443
92.185.204.18:2078
190.11.198.66:443
81.229.117.95:2222
105.109.163.112:2078
91.169.12.198:32100
105.109.163.112:990
105.109.163.112:22
174.112.25.29:2078
84.35.26.14:995
70.121.198.103:2078
91.180.68.95:2222
70.51.135.213:2222
24.140.238.222:443
190.75.110.239:443
174.45.15.123:443
92.97.224.253:2222
109.219.126.249:2222
24.206.27.39:443
170.253.25.35:443
80.13.179.151:2222
157.231.42.190:995
184.153.132.82:443
23.240.47.58:995
86.171.75.63:443
58.162.223.233:443
184.155.91.69:443
86.130.9.140:2222
77.86.98.236:443
90.4.227.93:2222
99.253.103.210:443
47.203.227.114:443
174.101.111.4:443
86.195.32.149:2222
94.63.65.146:443
67.177.107.133:995
71.183.236.133:993
109.149.147.182:2222
180.151.118.201:443
184.176.154.83:995
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewermgr.exepid process 1952 rundll32.exe 1952 rundll32.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe 1500 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 1952 rundll32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 4064 wrote to memory of 3648 4064 cmd.exe rundll32.exe PID 4064 wrote to memory of 3648 4064 cmd.exe rundll32.exe PID 3648 wrote to memory of 1952 3648 rundll32.exe rundll32.exe PID 3648 wrote to memory of 1952 3648 rundll32.exe rundll32.exe PID 3648 wrote to memory of 1952 3648 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1500 1952 rundll32.exe wermgr.exe PID 1952 wrote to memory of 1500 1952 rundll32.exe wermgr.exe PID 1952 wrote to memory of 1500 1952 rundll32.exe wermgr.exe PID 1952 wrote to memory of 1500 1952 rundll32.exe wermgr.exe PID 1952 wrote to memory of 1500 1952 rundll32.exe wermgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\clowns.zip1⤵PID:4688
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Documents\clowns\run.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\system32\rundll32.exerundll32 cocking.temp,DrawThemeIcon2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\rundll32.exerundll32 cocking.temp,DrawThemeIcon3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
-