Analysis
-
max time kernel
149s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-12-2022 17:37
Static task
static1
Behavioral task
behavioral1
Sample
VV.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
VV.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
slings/denudes.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
slings/denudes.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
slings/explorations.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
slings/explorations.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
slings/mismanagement.cmd
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
slings/mismanagement.cmd
Resource
win10v2004-20221111-en
General
-
Target
VV.lnk
-
Size
1KB
-
MD5
55cff16eda4d6a738b16d9a31e9983d4
-
SHA1
4ebe6953f2a46fc8a4fbc6e70bca35ee299a568d
-
SHA256
3e747c8a3be9d49dbd4b8993a946a0562f10fe9f8cf9b30901fcd8a407e76b0c
-
SHA512
870bb8f310868d40dfc1633097af08fc665fc0942b94555fe5de073beb15524a2a542ddb80529d0faba2e985bce2f7f6a4535c528a73fc91625d9d2349520dc0
Malware Config
Extracted
qakbot
404.46
BB10
1671090444
108.6.249.139:443
92.145.203.167:2222
24.206.27.39:443
178.152.25.80:443
87.57.13.215:443
75.143.236.149:443
49.245.119.12:2222
84.35.26.14:995
86.130.9.250:2222
12.172.173.82:995
147.148.234.231:2222
83.114.60.6:2222
213.67.255.57:2222
102.40.202.189:995
149.126.159.106:443
50.68.204.71:995
47.41.154.250:443
50.68.204.71:443
12.172.173.82:465
190.18.236.175:443
79.13.202.140:443
70.55.120.16:2222
123.3.240.16:995
70.115.104.126:995
188.48.116.37:995
87.65.160.87:995
221.161.103.6:443
27.99.45.237:2222
76.80.180.154:995
103.144.201.62:2078
72.80.7.6:995
90.104.22.28:2222
199.83.165.233:443
78.193.176.97:443
76.100.159.250:443
47.34.30.133:443
87.149.127.43:995
108.162.6.34:443
73.161.176.218:443
136.232.184.134:995
124.122.55.7:443
77.86.98.236:443
51.186.2.140:443
109.11.175.42:2222
93.156.97.145:443
88.126.94.4:50000
216.160.116.140:2222
31.167.254.199:995
2.50.44.83:443
89.129.109.27:2222
49.205.231.75:2222
96.246.158.46:995
50.68.204.71:993
216.36.153.248:443
84.219.213.130:6881
184.176.154.83:995
92.207.132.174:2222
142.161.27.232:2222
49.175.72.56:443
184.68.116.146:2078
66.191.69.18:995
90.89.95.158:2222
198.2.51.242:993
73.36.196.11:443
176.151.15.101:443
75.158.15.211:443
69.133.162.35:443
184.68.116.146:61202
12.172.173.82:21
186.64.67.55:443
162.248.14.107:443
86.225.214.138:2222
91.231.172.236:995
83.92.85.93:443
24.142.218.202:443
70.77.116.233:443
75.98.154.19:443
81.248.77.37:2222
12.172.173.82:50001
12.172.173.82:22
172.117.139.142:995
70.120.228.205:443
79.77.142.22:2222
80.44.148.126:2222
78.101.91.215:2222
181.118.206.65:995
92.24.200.226:995
75.141.227.169:443
190.24.45.24:995
174.104.184.149:443
98.187.21.2:443
121.121.100.148:995
172.90.139.138:2222
75.99.125.234:2222
172.248.42.122:443
94.63.65.146:443
98.145.23.67:443
91.68.227.219:443
85.59.61.52:2222
74.66.134.24:443
12.172.173.82:993
150.107.231.59:2222
64.237.240.3:443
173.239.94.212:443
91.169.12.198:32100
67.235.138.14:443
24.71.120.191:443
173.18.126.3:443
60.234.194.12:2222
175.139.130.191:2222
74.92.243.113:50000
213.191.164.70:443
184.153.132.82:443
91.96.249.3:443
69.119.123.159:2222
81.229.117.95:2222
92.189.214.236:2222
73.155.10.79:443
216.82.134.133:443
184.68.116.146:3389
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1696 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 596 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 672 cmd.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 1696 rundll32.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe 4652 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1696 rundll32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1096 wrote to memory of 672 1096 cmd.exe 29 PID 1096 wrote to memory of 672 1096 cmd.exe 29 PID 1096 wrote to memory of 672 1096 cmd.exe 29 PID 1096 wrote to memory of 672 1096 cmd.exe 29 PID 672 wrote to memory of 596 672 cmd.exe 30 PID 672 wrote to memory of 596 672 cmd.exe 30 PID 672 wrote to memory of 596 672 cmd.exe 30 PID 672 wrote to memory of 596 672 cmd.exe 30 PID 596 wrote to memory of 1368 596 cmd.exe 32 PID 596 wrote to memory of 1368 596 cmd.exe 32 PID 596 wrote to memory of 1368 596 cmd.exe 32 PID 596 wrote to memory of 1368 596 cmd.exe 32 PID 596 wrote to memory of 1696 596 cmd.exe 33 PID 596 wrote to memory of 1696 596 cmd.exe 33 PID 596 wrote to memory of 1696 596 cmd.exe 33 PID 596 wrote to memory of 1696 596 cmd.exe 33 PID 596 wrote to memory of 1696 596 cmd.exe 33 PID 596 wrote to memory of 1696 596 cmd.exe 33 PID 596 wrote to memory of 1696 596 cmd.exe 33 PID 1696 wrote to memory of 4652 1696 rundll32.exe 34 PID 1696 wrote to memory of 4652 1696 rundll32.exe 34 PID 1696 wrote to memory of 4652 1696 rundll32.exe 34 PID 1696 wrote to memory of 4652 1696 rundll32.exe 34 PID 1696 wrote to memory of 4652 1696 rundll32.exe 34 PID 1696 wrote to memory of 4652 1696 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\VV.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /q /c slings\mismanagement.cmd2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K slings\explorations.cmd System RunDl3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\replace.exereplace C:\Windows\\System32\\RunDlL32.eXe C:\Users\Admin\AppData\Local\Temp /A4⤵PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\rundll32.exeRunDlL32.eXe slings\\denudes.sql,DrawThemeIcon4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d