Resubmissions
09-12-2022 21:31
221209-1c7lnsed59 1001-12-2022 01:51
221201-b99d4ade82 1001-12-2022 01:46
221201-b7b1tagf7t 3Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 01:51
Static task
static1
General
-
Target
WT-163WP.iso
-
Size
101.2MB
-
MD5
b650be9066248fd19bf55295a3dd91c1
-
SHA1
08dbe772979f2cf9b70637ecb4fbed0a29517b4a
-
SHA256
ad914a64e27ceb65f105dda2b9333507503acf7b5dfa24dcaf0eebed70e10c9b
-
SHA512
cd2dbb0d4addb80ff59126febd145b6a127378a6eadb18bdc3bffe8eab54b2db71352920c12be1882df88aa2eb8bd5b1d3b38124a4d607fabfd4194f380c3aaf
-
SSDEEP
24576:xFolOZ7iwCywfHH3vwLwZ0RV9Z0OEdMddz52kqAaBJP8fnLJ518VCqoI2ytH2:xFolOZ7iwCywfHH3vwLwDuDHAH2
Malware Config
Extracted
qakbot
404.46
obama224
1669794048
75.161.233.194:995
216.82.134.218:443
174.104.184.149:443
173.18.126.3:443
87.202.101.164:50000
172.90.139.138:2222
184.153.132.82:443
185.135.120.81:443
24.228.132.224:2222
87.223.84.190:443
178.153.195.40:443
24.64.114.59:2222
77.126.81.208:443
75.99.125.235:2222
173.239.94.212:443
98.145.23.67:443
109.177.245.176:2222
72.200.109.104:443
12.172.173.82:993
82.11.242.219:443
92.149.205.238:2222
183.82.100.110:2222
176.142.207.63:443
92.24.200.226:995
69.119.123.159:2222
91.169.12.198:32100
64.121.161.102:443
124.122.55.68:443
12.172.173.82:995
85.231.105.49:2222
94.63.65.146:443
176.133.4.230:995
213.67.255.57:2222
90.89.95.158:2222
156.217.158.177:995
88.126.94.4:50000
87.57.13.215:443
102.159.83.36:443
121.122.99.223:995
216.196.245.102:2222
12.172.173.82:465
78.69.251.252:2222
76.80.180.154:995
75.143.236.149:443
109.11.175.42:2222
221.161.103.6:443
74.92.243.113:50000
75.98.154.19:443
47.41.154.250:443
49.175.72.56:443
81.229.117.95:2222
92.189.214.236:2222
83.92.85.93:443
108.162.6.34:443
84.35.26.14:995
136.232.184.134:995
188.54.99.243:995
93.24.192.142:20
75.84.234.68:443
71.31.101.183:443
80.13.179.151:2222
184.155.91.69:443
76.100.159.250:443
24.64.114.59:3389
46.246.245.152:995
70.115.104.126:995
197.2.209.208:995
50.90.249.161:443
70.66.199.12:443
216.196.245.102:2083
182.66.197.35:443
142.161.27.232:2222
76.127.192.23:443
92.207.132.174:2222
174.77.209.5:443
12.172.173.82:21
199.83.165.233:443
74.66.134.24:443
77.86.98.236:443
90.104.22.28:2222
71.247.10.63:50003
108.6.249.139:443
184.176.154.83:995
81.198.136.151:995
80.0.74.165:443
71.247.10.63:995
174.58.146.57:443
69.133.162.35:443
50.68.204.71:995
24.64.114.59:61202
47.34.30.133:443
12.172.173.82:50001
75.158.15.211:443
216.196.245.102:2078
181.164.194.228:443
193.154.207.221:443
213.191.164.70:443
197.92.135.188:443
172.117.139.142:995
76.20.42.45:443
24.64.114.59:2078
73.36.196.11:443
58.247.115.126:995
73.155.10.79:443
92.98.72.220:2222
84.113.121.103:443
2.50.47.109:443
12.172.173.82:990
106.212.18.255:995
98.147.155.235:443
92.106.70.62:2222
108.44.207.232:443
24.206.27.39:443
130.43.99.103:995
50.68.204.71:993
71.46.234.171:443
108.162.6.34:995
24.142.218.202:443
166.62.145.54:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4592 rundll32.exe 4628 rundll32.exe 3344 rundll32.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
WScript.exeWScript.exeWScript.exedescription ioc process File opened (read-only) \??\E: WScript.exe File opened (read-only) \??\E: WScript.exe File opened (read-only) \??\E: WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
powershell.exepowershell.exepowershell.exerundll32.exerundll32.exerundll32.exewermgr.exepid process 3676 powershell.exe 1064 powershell.exe 1064 powershell.exe 3676 powershell.exe 2852 powershell.exe 2852 powershell.exe 4592 rundll32.exe 4628 rundll32.exe 4592 rundll32.exe 4628 rundll32.exe 3344 rundll32.exe 3344 rundll32.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe 4676 wermgr.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4592 rundll32.exe 4628 rundll32.exe 3344 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
cmd.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeManageVolumePrivilege 2372 cmd.exe Token: SeManageVolumePrivilege 2372 cmd.exe Token: SeDebugPrivilege 3676 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
WScript.exeWScript.exeWScript.exepowershell.exepowershell.exepowershell.exerundll32.exerundll32.exerundll32.exedescription pid process target process PID 2556 wrote to memory of 3676 2556 WScript.exe powershell.exe PID 2556 wrote to memory of 3676 2556 WScript.exe powershell.exe PID 2556 wrote to memory of 3676 2556 WScript.exe powershell.exe PID 4796 wrote to memory of 1064 4796 WScript.exe powershell.exe PID 4796 wrote to memory of 1064 4796 WScript.exe powershell.exe PID 4796 wrote to memory of 1064 4796 WScript.exe powershell.exe PID 2332 wrote to memory of 2852 2332 WScript.exe powershell.exe PID 2332 wrote to memory of 2852 2332 WScript.exe powershell.exe PID 2332 wrote to memory of 2852 2332 WScript.exe powershell.exe PID 2852 wrote to memory of 4628 2852 powershell.exe rundll32.exe PID 2852 wrote to memory of 4628 2852 powershell.exe rundll32.exe PID 2852 wrote to memory of 4628 2852 powershell.exe rundll32.exe PID 1064 wrote to memory of 3344 1064 powershell.exe rundll32.exe PID 1064 wrote to memory of 3344 1064 powershell.exe rundll32.exe PID 1064 wrote to memory of 3344 1064 powershell.exe rundll32.exe PID 3676 wrote to memory of 4592 3676 powershell.exe rundll32.exe PID 3676 wrote to memory of 4592 3676 powershell.exe rundll32.exe PID 3676 wrote to memory of 4592 3676 powershell.exe rundll32.exe PID 4592 wrote to memory of 4676 4592 rundll32.exe wermgr.exe PID 4592 wrote to memory of 4676 4592 rundll32.exe wermgr.exe PID 4592 wrote to memory of 4676 4592 rundll32.exe wermgr.exe PID 3344 wrote to memory of 2164 3344 rundll32.exe wermgr.exe PID 3344 wrote to memory of 2164 3344 rundll32.exe wermgr.exe PID 3344 wrote to memory of 2164 3344 rundll32.exe wermgr.exe PID 4628 wrote to memory of 4536 4628 rundll32.exe wermgr.exe PID 4628 wrote to memory of 4536 4628 rundll32.exe wermgr.exe PID 4628 wrote to memory of 4536 4628 rundll32.exe wermgr.exe PID 4592 wrote to memory of 4676 4592 rundll32.exe wermgr.exe PID 4628 wrote to memory of 4536 4628 rundll32.exe wermgr.exe PID 3344 wrote to memory of 2164 3344 rundll32.exe wermgr.exe PID 4628 wrote to memory of 4536 4628 rundll32.exe wermgr.exe PID 3344 wrote to memory of 2164 3344 rundll32.exe wermgr.exe PID 4592 wrote to memory of 4676 4592 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WT-163WP.iso1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "E:\WP.vbs"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass metaphysic\\theologian.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\arsonistEfficaciously.txt DrawThemeIcon3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "E:\WP.vbs"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass metaphysic\\theologian.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\arsonistEfficaciously.txt DrawThemeIcon3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "E:\WP.vbs"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass metaphysic\\theologian.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\users\public\arsonistEfficaciously.txt DrawThemeIcon3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
C:\Users\Public\arsonistEfficaciously.txtFilesize
577KB
MD5a8c6be5d4821e00f7c3be140bd097493
SHA13f43db3e6862f64d51b95105c196204a956c2a4b
SHA25641c245c859bad2bfce11d9a13d14925b7e31968587e32e6c523b2679673bab03
SHA512b1355dff2e69f3a8ff858fd77b411bf437e26750a503ab8231a7444be5d2b1dde62b6f5d16708f0cb5ed0718a44ec30b306f3ef97ff15ebe423e1fec9aea13ae
-
C:\Users\Public\arsonistEfficaciously.txtFilesize
577KB
MD5a8c6be5d4821e00f7c3be140bd097493
SHA13f43db3e6862f64d51b95105c196204a956c2a4b
SHA25641c245c859bad2bfce11d9a13d14925b7e31968587e32e6c523b2679673bab03
SHA512b1355dff2e69f3a8ff858fd77b411bf437e26750a503ab8231a7444be5d2b1dde62b6f5d16708f0cb5ed0718a44ec30b306f3ef97ff15ebe423e1fec9aea13ae
-
C:\Users\Public\arsonistEfficaciously.txtFilesize
577KB
MD5a8c6be5d4821e00f7c3be140bd097493
SHA13f43db3e6862f64d51b95105c196204a956c2a4b
SHA25641c245c859bad2bfce11d9a13d14925b7e31968587e32e6c523b2679673bab03
SHA512b1355dff2e69f3a8ff858fd77b411bf437e26750a503ab8231a7444be5d2b1dde62b6f5d16708f0cb5ed0718a44ec30b306f3ef97ff15ebe423e1fec9aea13ae
-
C:\users\public\arsonistEfficaciously.txtFilesize
577KB
MD5a8c6be5d4821e00f7c3be140bd097493
SHA13f43db3e6862f64d51b95105c196204a956c2a4b
SHA25641c245c859bad2bfce11d9a13d14925b7e31968587e32e6c523b2679673bab03
SHA512b1355dff2e69f3a8ff858fd77b411bf437e26750a503ab8231a7444be5d2b1dde62b6f5d16708f0cb5ed0718a44ec30b306f3ef97ff15ebe423e1fec9aea13ae
-
C:\users\public\arsonistEfficaciously.txtFilesize
577KB
MD5a8c6be5d4821e00f7c3be140bd097493
SHA13f43db3e6862f64d51b95105c196204a956c2a4b
SHA25641c245c859bad2bfce11d9a13d14925b7e31968587e32e6c523b2679673bab03
SHA512b1355dff2e69f3a8ff858fd77b411bf437e26750a503ab8231a7444be5d2b1dde62b6f5d16708f0cb5ed0718a44ec30b306f3ef97ff15ebe423e1fec9aea13ae
-
C:\users\public\arsonistEfficaciously.txtFilesize
577KB
MD5a8c6be5d4821e00f7c3be140bd097493
SHA13f43db3e6862f64d51b95105c196204a956c2a4b
SHA25641c245c859bad2bfce11d9a13d14925b7e31968587e32e6c523b2679673bab03
SHA512b1355dff2e69f3a8ff858fd77b411bf437e26750a503ab8231a7444be5d2b1dde62b6f5d16708f0cb5ed0718a44ec30b306f3ef97ff15ebe423e1fec9aea13ae
-
C:\users\public\arsonistEfficaciously.txtFilesize
4KB
MD54506b4c74746144031e742f667992ba9
SHA13c403d161a8ef03647026c75886b19b5e9cd02f6
SHA25603ceb3ba15e810310dc24305ca2b8d5439e93058320c74b6c3665fb31ffc2585
SHA51260f4b81d667173dac0e732858b0b28d6a1becb3a3d9f2193540c8384f73015a2539855c5a13291afef73076737c3186ff1803f4edee23a2fe7e1b97729fc636f
-
C:\users\public\arsonistEfficaciously.txtFilesize
4KB
MD54506b4c74746144031e742f667992ba9
SHA13c403d161a8ef03647026c75886b19b5e9cd02f6
SHA25603ceb3ba15e810310dc24305ca2b8d5439e93058320c74b6c3665fb31ffc2585
SHA51260f4b81d667173dac0e732858b0b28d6a1becb3a3d9f2193540c8384f73015a2539855c5a13291afef73076737c3186ff1803f4edee23a2fe7e1b97729fc636f
-
memory/1064-142-0x0000000006C00000-0x0000000006C22000-memory.dmpFilesize
136KB
-
memory/1064-135-0x0000000000000000-mapping.dmp
-
memory/1064-137-0x0000000005F00000-0x0000000005F66000-memory.dmpFilesize
408KB
-
memory/1064-138-0x0000000005F70000-0x0000000005FD6000-memory.dmpFilesize
408KB
-
memory/1064-140-0x0000000007650000-0x00000000076E6000-memory.dmpFilesize
600KB
-
memory/2164-169-0x00000000003A0000-0x00000000003CA000-memory.dmpFilesize
168KB
-
memory/2164-161-0x0000000000000000-mapping.dmp
-
memory/2852-144-0x0000000000000000-mapping.dmp
-
memory/3344-157-0x0000000000760000-0x000000000078A000-memory.dmpFilesize
168KB
-
memory/3344-164-0x0000000000760000-0x000000000078A000-memory.dmpFilesize
168KB
-
memory/3344-149-0x0000000000000000-mapping.dmp
-
memory/3676-143-0x0000000007830000-0x0000000007DD4000-memory.dmpFilesize
5.6MB
-
memory/3676-139-0x0000000005E60000-0x0000000005E7E000-memory.dmpFilesize
120KB
-
memory/3676-132-0x0000000000000000-mapping.dmp
-
memory/3676-141-0x0000000006520000-0x000000000653A000-memory.dmpFilesize
104KB
-
memory/3676-136-0x0000000005100000-0x0000000005122000-memory.dmpFilesize
136KB
-
memory/3676-133-0x00000000026A0000-0x00000000026D6000-memory.dmpFilesize
216KB
-
memory/3676-134-0x00000000051C0000-0x00000000057E8000-memory.dmpFilesize
6.2MB
-
memory/4536-160-0x0000000000000000-mapping.dmp
-
memory/4536-168-0x0000000001000000-0x000000000102A000-memory.dmpFilesize
168KB
-
memory/4592-150-0x0000000000000000-mapping.dmp
-
memory/4592-165-0x0000000002CF0000-0x0000000002D1A000-memory.dmpFilesize
168KB
-
memory/4592-158-0x0000000002CF0000-0x0000000002D1A000-memory.dmpFilesize
168KB
-
memory/4592-156-0x0000000002BC0000-0x0000000002BED000-memory.dmpFilesize
180KB
-
memory/4628-163-0x0000000000C10000-0x0000000000C3A000-memory.dmpFilesize
168KB
-
memory/4628-159-0x0000000000C10000-0x0000000000C3A000-memory.dmpFilesize
168KB
-
memory/4628-148-0x0000000000000000-mapping.dmp
-
memory/4676-162-0x0000000000000000-mapping.dmp
-
memory/4676-170-0x0000000000E00000-0x0000000000E2A000-memory.dmpFilesize
168KB
-
memory/4676-171-0x0000000000E00000-0x0000000000E2A000-memory.dmpFilesize
168KB