Analysis
-
max time kernel
103s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2022, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
grogramFlavorous.iso
Resource
win7-20221111-en
General
-
Target
grogramFlavorous.iso
-
Size
3.9MB
-
MD5
fc823731e692d229cb4ed7694108c8a3
-
SHA1
b0ef3dba3899f1a15f2a8565ec1f4feb6199cb86
-
SHA256
56ad587663f0a2714b1ae8187f1b1a1330f8ba8c46066967035e9588131cc3b0
-
SHA512
d2492d755298a1a07719d364bf522a69fd9fc97793501e2799ddc1e27321a6f4db93bc393ba5a3bcd1a94540edebc48621f84a01d6a576edcf9c2c3365fef375
-
SSDEEP
49152:yegKpXN707cQsDRm+wl40tjevzXqV/LURRrxXF1MptNHWbfFm4xI/ac+kf:Cem/
Malware Config
Extracted
qakbot
404.62
BB11
1671561386
184.68.116.146:3389
92.189.214.236:2222
73.29.92.128:443
92.239.81.124:443
47.203.227.114:443
199.83.165.233:443
12.172.173.82:995
12.172.173.82:50001
136.244.25.165:443
37.15.128.31:2222
91.96.249.3:443
92.27.86.48:2222
75.156.125.215:995
93.147.134.85:443
86.176.246.195:2222
89.129.109.27:2222
70.55.120.16:2222
50.67.17.92:443
78.92.133.215:443
190.100.149.122:995
86.183.251.169:2222
184.68.116.146:2222
217.43.16.149:443
208.180.17.32:2222
75.143.236.149:443
70.64.77.115:443
76.184.95.190:993
73.161.176.218:443
84.35.26.14:995
67.235.138.14:443
206.166.209.170:2222
108.6.249.139:443
70.51.136.204:2222
67.253.226.137:995
201.137.206.40:443
176.44.121.220:995
31.48.67.240:443
80.103.77.44:2222
86.160.253.56:443
184.68.116.146:2078
76.80.180.154:995
181.118.183.50:443
173.178.151.233:443
72.80.7.6:995
109.220.196.24:2222
47.34.30.133:443
76.170.252.153:995
12.172.173.82:21
216.36.153.248:443
70.77.116.233:443
47.41.154.250:443
108.162.6.34:443
50.68.204.71:443
24.69.84.237:443
87.65.160.87:995
73.36.196.11:443
76.68.151.148:2222
89.203.252.238:443
81.131.210.167:443
96.255.66.51:995
12.172.173.82:465
95.23.15.84:2222
67.61.71.201:443
66.191.69.18:995
51.211.219.211:443
79.13.202.140:443
77.86.98.236:443
70.115.104.126:995
152.170.17.136:443
70.120.228.205:443
178.153.5.54:443
12.172.173.82:20
91.254.132.23:443
72.88.245.71:443
45.230.169.132:995
142.118.49.193:2222
65.95.85.172:2222
136.35.241.159:443
69.159.156.133:2222
92.8.187.85:2222
69.133.162.35:443
184.68.116.146:50010
86.130.9.250:2222
149.74.159.67:2222
176.133.4.230:995
46.10.198.106:443
2.14.96.234:2222
78.101.91.215:2222
92.154.45.81:2222
79.77.142.22:2222
12.172.173.82:22
12.172.173.82:32101
90.66.229.185:2222
86.225.214.138:2222
173.18.126.3:443
174.104.184.149:443
90.89.95.158:2222
162.248.14.107:443
190.249.241.149:443
78.18.42.55:443
184.68.116.146:61202
64.123.103.123:443
12.172.173.82:990
38.166.221.92:2087
184.176.154.83:995
92.207.132.174:2222
75.98.154.19:443
142.161.27.232:2222
84.113.121.103:443
90.104.22.28:2222
75.84.234.68:443
198.2.51.242:993
86.139.213.115:443
50.68.204.71:993
201.210.114.115:993
71.31.101.183:443
74.33.196.114:443
87.252.106.197:995
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3544 Unbrokenness.exe 3652 ginglmiYarovized.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Unbrokenness.exe -
Loads dropped DLL 1 IoCs
pid Process 3296 rundll32.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: Unbrokenness.exe File opened (read-only) \??\E: cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3076 PING.EXE 3356 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3296 rundll32.exe 3296 rundll32.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe 4364 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3296 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 4572 cmd.exe Token: SeManageVolumePrivilege 4572 cmd.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2672 wrote to memory of 452 2672 cmd.exe 97 PID 2672 wrote to memory of 452 2672 cmd.exe 97 PID 2672 wrote to memory of 3656 2672 cmd.exe 98 PID 2672 wrote to memory of 3656 2672 cmd.exe 98 PID 2672 wrote to memory of 3544 2672 cmd.exe 99 PID 2672 wrote to memory of 3544 2672 cmd.exe 99 PID 3544 wrote to memory of 1648 3544 Unbrokenness.exe 101 PID 3544 wrote to memory of 1648 3544 Unbrokenness.exe 101 PID 2672 wrote to memory of 3076 2672 cmd.exe 103 PID 2672 wrote to memory of 3076 2672 cmd.exe 103 PID 1648 wrote to memory of 2356 1648 cmd.exe 104 PID 1648 wrote to memory of 2356 1648 cmd.exe 104 PID 1648 wrote to memory of 4736 1648 cmd.exe 105 PID 1648 wrote to memory of 4736 1648 cmd.exe 105 PID 1648 wrote to memory of 3652 1648 cmd.exe 106 PID 1648 wrote to memory of 3652 1648 cmd.exe 106 PID 3652 wrote to memory of 3296 3652 ginglmiYarovized.exe 107 PID 3652 wrote to memory of 3296 3652 ginglmiYarovized.exe 107 PID 3652 wrote to memory of 3296 3652 ginglmiYarovized.exe 107 PID 3296 wrote to memory of 4364 3296 rundll32.exe 108 PID 3296 wrote to memory of 4364 3296 rundll32.exe 108 PID 3296 wrote to memory of 4364 3296 rundll32.exe 108 PID 3296 wrote to memory of 4364 3296 rundll32.exe 108 PID 3296 wrote to memory of 4364 3296 rundll32.exe 108 PID 1648 wrote to memory of 3356 1648 cmd.exe 109 PID 1648 wrote to memory of 3356 1648 cmd.exe 109
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\grogramFlavorous.iso1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\ginglmiYarovized.cmd" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"2⤵PID:452
-
-
C:\Windows\system32\xcopy.exexcopy C:\Windows\\\\\\system32\\\\\\wscript.exe C:\Users\Admin\AppData\Local\Temp\Unbrokenness.exe /h /s /e2⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Unbrokenness.exeC:\Users\Admin\AppData\Local\Temp\Unbrokenness.exe Hohokam\UndeceptivelyEmotiomotor.wsf2⤵
- Executes dropped EXE
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C \Hohokam\brambleberries\sniffling.cmd3⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"4⤵PID:2356
-
-
C:\Windows\system32\xcopy.exexcopy C:\Windows\\\\\\system32\\\\\\rundll32.exe C:\Users\Admin\AppData\Local\Temp\ginglmiYarovized.exe /h /s /e4⤵PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\ginglmiYarovized.exeC:\Users\Admin\AppData\Local\Temp\ginglmiYarovized.exe c:\\users\\public\\opisthocomidae.dll, Updt4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\ginglmiYarovized.exe c:\\users\\public\\opisthocomidae.dll, Updt5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
-
-
C:\Windows\system32\PING.EXEping 210.125.188.1734⤵
- Runs ping.exe
PID:3356
-
-
-
-
C:\Windows\system32\PING.EXEping 201.223.204.22⤵
- Runs ping.exe
PID:3076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD5a47cbe969ea935bdd3ab568bb126bc80
SHA115f2facfd05daf46d2c63912916bf2887cebd98a
SHA25634008e2057df8842df210246995385a0441dc1e081d60ad15bd481e062e7f100
SHA512f5c81e6dc4d916944304fc85136e1ff6dee29a21e50a54fe6280a475343eccbfe094171d62475db5f38e07898c061126158c34d48b9d8f4f57f76d49e564e3fc
-
Filesize
166KB
MD5a47cbe969ea935bdd3ab568bb126bc80
SHA115f2facfd05daf46d2c63912916bf2887cebd98a
SHA25634008e2057df8842df210246995385a0441dc1e081d60ad15bd481e062e7f100
SHA512f5c81e6dc4d916944304fc85136e1ff6dee29a21e50a54fe6280a475343eccbfe094171d62475db5f38e07898c061126158c34d48b9d8f4f57f76d49e564e3fc
-
Filesize
70KB
MD5ef3179d498793bf4234f708d3be28633
SHA1dd399ae46303343f9f0da189aee11c67bd868222
SHA256b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa
SHA51202aff154762d7e53e37754f878ce6aa3f4df5a1eb167e27f13d9762dced32bec892bfa3f3314e3c6dce5998f7d3c400d7d0314b9326eedcab72207c60b3d332e
-
Filesize
70KB
MD5ef3179d498793bf4234f708d3be28633
SHA1dd399ae46303343f9f0da189aee11c67bd868222
SHA256b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa
SHA51202aff154762d7e53e37754f878ce6aa3f4df5a1eb167e27f13d9762dced32bec892bfa3f3314e3c6dce5998f7d3c400d7d0314b9326eedcab72207c60b3d332e
-
Filesize
2.7MB
MD51b09c2ef150fb641124492f3f34374d9
SHA1ec6e5c381326bbd2908e6a8a55264aa0fc9c293c
SHA256b6ef564310bbbdfc8d8aaf35dc5e99c257fc5a67a2f0aa9fb786b3b199620c00
SHA5129372a5d196f09e5303a4109acd6e06910508a762cc168233b16417f8d65ed6ef2a1f511135d0866614a4e1c433c063f3221760487eb5da11c9ae72ee765ff7ed
-
Filesize
2.7MB
MD51b09c2ef150fb641124492f3f34374d9
SHA1ec6e5c381326bbd2908e6a8a55264aa0fc9c293c
SHA256b6ef564310bbbdfc8d8aaf35dc5e99c257fc5a67a2f0aa9fb786b3b199620c00
SHA5129372a5d196f09e5303a4109acd6e06910508a762cc168233b16417f8d65ed6ef2a1f511135d0866614a4e1c433c063f3221760487eb5da11c9ae72ee765ff7ed