Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
Summary_7566182_12202022.img
Resource
win7-20220812-en
General
-
Target
Summary_7566182_12202022.img
-
Size
1.6MB
-
MD5
f6f3320f5b8fb43eb56810ddbf392b32
-
SHA1
5985f18fcee5044f2c7f4a5852aeb7538a57188f
-
SHA256
09dede775ba5d3440038634552e44061c779a531139b685610972a76f2a78ca1
-
SHA512
8a3749384491d9e52b733c81ea8bb12aac2959f7642ccff4829baf7d8c7aec7f06c5a640fbb5d46b7a533eb5a0db52705bd37cf65453068eb5d4f1857edb096b
-
SSDEEP
6144:8sK8UXXfATbrOQBOs5QpxL66KiHpKlVfvBPA3BKyDGQVu/QNUWxk:8sK8UXXwrMyzPVpPqtGCuoN2
Malware Config
Extracted
qakbot
404.46
BB11
1671442875
24.71.120.191:443
121.121.100.148:995
172.90.139.138:2222
70.55.120.16:2222
75.99.125.234:2222
172.248.42.122:443
37.14.229.220:2222
83.7.52.202:443
85.241.180.94:443
90.206.194.248:443
31.53.29.141:2222
72.80.7.6:50003
74.92.243.113:50000
90.48.151.17:2222
176.142.207.63:443
178.153.5.54:443
74.66.134.24:443
46.162.109.183:443
12.172.173.82:993
64.237.240.3:443
65.20.175.208:443
69.119.123.159:2222
94.105.123.53:443
99.229.164.42:443
91.169.12.198:32100
184.153.132.82:443
81.229.117.95:2222
82.34.170.37:443
86.96.75.237:2222
27.109.19.90:2078
109.219.126.249:2222
91.165.188.74:50000
175.139.130.191:2222
76.20.42.45:443
12.172.173.82:50001
91.96.249.3:443
150.107.231.59:2222
12.172.173.82:995
128.127.21.57:443
184.68.116.146:2222
87.220.205.65:2222
184.68.116.146:3389
87.223.95.66:443
92.189.214.236:2222
73.29.92.128:443
86.165.15.180:2222
82.6.99.234:443
92.27.86.48:2222
174.112.22.106:2078
187.199.184.14:32103
199.83.165.233:443
37.15.128.31:2222
90.79.129.166:2222
136.244.25.165:443
93.147.134.85:443
202.187.239.67:995
75.143.236.149:443
67.235.138.14:443
84.35.26.14:995
147.148.234.231:2222
108.6.249.139:443
86.98.23.199:443
60.254.51.168:443
103.55.67.180:443
176.44.121.220:995
103.42.86.42:995
103.141.50.151:995
217.128.200.114:2222
24.228.132.224:2222
90.119.197.132:2222
76.80.180.154:995
72.80.7.6:995
50.68.204.71:995
47.34.30.133:443
103.212.19.254:995
116.74.163.30:443
47.41.154.250:443
83.110.95.209:995
50.68.204.71:443
78.100.238.92:995
12.172.173.82:465
90.116.219.167:2222
86.99.15.254:2222
62.35.67.88:443
92.186.69.229:2222
84.108.173.79:443
79.13.202.140:443
77.86.98.236:443
123.3.240.16:995
86.196.35.232:2222
70.115.104.126:995
86.130.9.250:2222
92.185.204.18:2078
213.67.255.57:2222
73.36.196.11:443
186.64.67.55:443
103.144.201.62:2078
90.78.138.217:2222
76.170.252.153:995
87.202.101.164:50000
89.129.109.27:2222
87.57.13.215:443
108.162.6.34:443
87.65.160.87:995
45.152.16.14:443
12.172.173.82:20
85.245.221.87:2078
98.145.23.67:443
73.155.10.79:443
171.97.42.82:443
71.31.101.183:443
74.33.196.114:443
12.172.173.82:32101
45.248.169.101:443
174.104.184.149:443
90.66.229.185:2222
184.68.116.146:2078
12.172.173.82:22
173.18.126.3:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4332 rundll32.exe 4332 rundll32.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe 2092 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4332 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 3180 cmd.exe Token: SeManageVolumePrivilege 3180 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4332 4068 rundll32.exe 93 PID 4068 wrote to memory of 4332 4068 rundll32.exe 93 PID 4068 wrote to memory of 4332 4068 rundll32.exe 93 PID 4332 wrote to memory of 2092 4332 rundll32.exe 94 PID 4332 wrote to memory of 2092 4332 rundll32.exe 94 PID 4332 wrote to memory of 2092 4332 rundll32.exe 94 PID 4332 wrote to memory of 2092 4332 rundll32.exe 94 PID 4332 wrote to memory of 2092 4332 rundll32.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Summary_7566182_12202022.img1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2352
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" \Nlsdl.dat,DrawThemeIcon1⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" \Nlsdl.dat,DrawThemeIcon2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-