Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/12/2022, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
enjoying-H76.wsf
Resource
win7-20220812-en
General
-
Target
enjoying-H76.wsf
-
Size
484B
-
MD5
886626f72e3b4e7eaf76d806c853d3e6
-
SHA1
2f8daa763b0ae68e118be1cd5a78d3a1ea154da2
-
SHA256
405b8f2cb367e0fad300fcda2f7a93b17b2cf4e545a5ae0709a1a63d7fcf7cbe
-
SHA512
0f340cad2baa62cbbab8be9c21acded0d6525f21f8973652f1cf3623a66a5ded9cac353014c6fe520310292f90ad4e8e8ecbcc89b0631c079a1a9843eb9f1701
Malware Config
Extracted
qakbot
404.62
BB11
1671792531
116.74.162.173:443
108.6.249.139:443
2.99.47.198:2222
89.79.229.50:443
89.152.120.181:443
152.170.17.136:443
197.0.175.244:443
83.248.199.56:443
84.113.121.103:443
175.139.207.179:2222
190.78.77.15:993
162.248.14.107:443
184.153.132.82:443
12.172.173.82:995
12.172.173.82:50001
37.15.128.31:2222
178.142.126.181:443
176.142.207.63:443
199.83.165.233:443
93.147.134.85:443
64.237.240.3:443
75.99.125.238:2222
184.68.116.146:3389
93.147.235.8:443
184.68.116.146:2222
66.191.69.18:995
27.0.62.241:995
92.189.214.236:2222
73.29.92.128:443
188.52.183.146:995
76.170.252.153:995
12.172.173.82:21
76.20.42.45:443
125.20.112.94:443
96.255.66.51:995
75.143.236.149:443
69.159.156.133:2222
84.35.26.14:995
89.129.109.27:2222
67.235.138.14:443
114.79.144.210:443
47.34.30.133:443
37.14.229.220:2222
183.87.163.165:443
103.141.50.151:995
76.80.180.154:995
181.118.183.50:443
72.80.7.6:995
184.68.116.146:2078
88.126.94.4:50000
70.77.116.233:443
50.68.204.71:443
190.199.157.49:2222
108.162.6.34:443
87.65.160.87:995
73.36.196.11:443
12.172.173.82:465
79.13.202.140:443
77.86.98.236:443
70.115.104.126:995
2.82.10.152:443
222.35.203.59:995
27.109.19.90:2078
80.103.77.44:2222
92.27.86.48:2222
181.4.227.82:443
84.219.213.130:2222
150.107.231.59:2222
181.118.206.65:995
103.42.86.42:995
87.220.205.65:2222
86.160.253.56:443
41.227.93.13:995
202.142.98.62:443
121.121.100.148:995
87.252.106.197:995
172.90.139.138:2222
172.248.42.122:443
76.100.159.250:443
24.142.218.202:443
92.8.187.85:2222
2.14.140.222:2222
69.133.162.35:443
83.114.60.6:2222
185.13.180.250:443
82.6.99.234:443
82.9.210.36:443
50.68.204.71:995
178.153.3.212:443
90.79.129.166:2222
46.24.136.17:2078
84.215.202.22:443
174.58.146.57:443
90.89.95.158:2222
51.211.219.211:443
24.228.132.224:2222
202.187.239.67:995
12.172.173.82:993
12.172.173.82:990
92.98.72.220:2222
86.96.75.237:2222
60.254.51.168:443
202.142.98.62:995
86.130.9.250:2222
46.10.198.106:443
78.101.91.215:2222
79.77.142.22:2222
12.172.173.82:22
12.172.173.82:32101
98.145.23.67:443
173.76.49.61:443
86.225.214.138:2222
173.18.126.3:443
75.98.154.19:443
103.212.19.254:995
74.92.243.113:50000
90.66.229.185:2222
74.66.134.24:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1328 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1328 rundll32.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe 1116 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1328 rundll32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1812 wrote to memory of 868 1812 WScript.exe 28 PID 1812 wrote to memory of 868 1812 WScript.exe 28 PID 1812 wrote to memory of 868 1812 WScript.exe 28 PID 868 wrote to memory of 1328 868 rundll32.exe 29 PID 868 wrote to memory of 1328 868 rundll32.exe 29 PID 868 wrote to memory of 1328 868 rundll32.exe 29 PID 868 wrote to memory of 1328 868 rundll32.exe 29 PID 868 wrote to memory of 1328 868 rundll32.exe 29 PID 868 wrote to memory of 1328 868 rundll32.exe 29 PID 868 wrote to memory of 1328 868 rundll32.exe 29 PID 1328 wrote to memory of 1116 1328 rundll32.exe 30 PID 1328 wrote to memory of 1116 1328 rundll32.exe 30 PID 1328 wrote to memory of 1116 1328 rundll32.exe 30 PID 1328 wrote to memory of 1116 1328 rundll32.exe 30 PID 1328 wrote to memory of 1116 1328 rundll32.exe 30 PID 1328 wrote to memory of 1116 1328 rundll32.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\enjoying-H76.wsf"1⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\i.txt,Updt2⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\i.txt,Updt3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
817KB
MD549b9c7ceb82aa902d1450f18ce6eefb2
SHA1ae26b23113dd4b629885d89867fd44698a2f7423
SHA2564db8d023ec1ca958af48ad3f43e1199c167d5081f311abc202ebd47607b4c648
SHA512003e37990c3ef42c865a09f5e227e7f7cd1c2c615f1c47a81b1d33efdc04dad1b3935a17d69926b4391406cc5fbd3d87ed54968a2c737b3e37afd97fed2f41d2
-
Filesize
817KB
MD549b9c7ceb82aa902d1450f18ce6eefb2
SHA1ae26b23113dd4b629885d89867fd44698a2f7423
SHA2564db8d023ec1ca958af48ad3f43e1199c167d5081f311abc202ebd47607b4c648
SHA512003e37990c3ef42c865a09f5e227e7f7cd1c2c615f1c47a81b1d33efdc04dad1b3935a17d69926b4391406cc5fbd3d87ed54968a2c737b3e37afd97fed2f41d2