Overview
overview
10Static
static
PayInfo/Co...es.txt
windows7-x64
1PayInfo/Co...es.txt
windows10-2004-x64
1PayInfo/Di...ct.dll
windows7-x64
3PayInfo/Di...ct.dll
windows10-2004-x64
3PayInfo/In...on.txt
windows7-x64
1PayInfo/In...on.txt
windows10-2004-x64
1PayInfo/Issues.txt
windows7-x64
1PayInfo/Issues.txt
windows10-2004-x64
1PayInfo/LA...on.txt
windows7-x64
1PayInfo/LA...on.txt
windows10-2004-x64
1PayInfo/Ne...es.cmd
windows7-x64
10PayInfo/Ne...es.cmd
windows10-2004-x64
10RulesASAP_LKE7.lnk
windows7-x64
10RulesASAP_LKE7.lnk
windows10-2004-x64
10Analysis
-
max time kernel
163s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
PayInfo/ContractChanges.txt
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PayInfo/ContractChanges.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
PayInfo/DirectContract.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
PayInfo/DirectContract.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
PayInfo/Information.txt
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
PayInfo/Information.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
PayInfo/Issues.txt
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
PayInfo/Issues.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
PayInfo/LASTInformation.txt
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
PayInfo/LASTInformation.txt
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
PayInfo/NeedChangeRules.cmd
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
PayInfo/NeedChangeRules.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
RulesASAP_LKE7.lnk
Resource
win7-20221111-en
General
-
Target
RulesASAP_LKE7.lnk
-
Size
1KB
-
MD5
e456e46a3530af958ba4d8f8b0951a1d
-
SHA1
0c7a73e75f3d8f3a7dadb152c32cd752ef6515e5
-
SHA256
48ee10fe03d11fde7f8c57959c708eaa673f4b86a9e605273a91a41f70e8b45b
-
SHA512
93d585765c5a3778dfa6beccc8cd0989e366948613ebdbb7d0fb3822c8aa4b8f668016341ae3da7cb8529037186a2f29fc2b7f3d8e10a0bf01723a008e46200b
Malware Config
Extracted
qakbot
404.62
azd
1672147664
80.103.77.44:2222
136.35.241.159:443
73.88.173.113:443
186.64.67.12:443
76.80.180.154:995
83.248.199.56:443
125.20.112.94:443
72.80.7.6:995
50.68.204.71:443
90.79.129.166:2222
108.162.6.34:443
86.130.9.250:2222
41.228.225.131:995
86.134.75.5:443
190.249.241.149:443
70.115.104.126:995
84.113.121.103:443
198.2.51.242:993
172.90.139.138:2222
89.115.196.99:443
206.166.209.170:2222
162.248.14.107:443
201.210.79.16:2222
86.160.253.56:443
86.160.217.36:50000
95.23.15.84:2222
181.118.206.65:995
73.174.23.116:443
209.171.163.72:995
50.68.204.71:995
201.244.108.183:995
199.83.165.233:443
121.121.100.88:995
202.142.98.62:443
172.248.42.122:443
92.8.187.85:2222
98.187.21.2:443
85.85.34.201:993
69.133.162.35:443
70.95.236.129:443
76.20.42.45:443
12.172.173.82:32101
77.86.98.236:443
174.104.184.149:443
74.92.243.113:50000
12.172.173.82:993
12.172.173.82:990
90.119.197.132:2222
87.221.196.217:2222
76.100.159.250:443
184.68.116.146:61202
213.31.90.183:2222
86.183.251.169:2222
85.241.180.94:443
98.145.23.67:443
73.161.176.218:443
78.101.91.215:2222
71.31.101.183:443
74.33.196.114:443
183.87.163.165:443
93.156.96.104:443
50.68.204.71:993
12.172.173.82:22
173.76.49.61:443
173.18.126.3:443
75.98.154.19:443
86.225.214.138:2222
74.66.134.24:443
184.176.154.83:995
12.172.173.82:20
91.169.12.198:32100
81.229.117.95:2222
92.186.69.229:2222
77.124.17.122:443
103.42.86.42:995
46.10.198.106:443
92.239.81.124:443
202.142.98.62:995
82.6.99.234:443
24.142.218.202:443
91.68.227.219:443
90.116.219.167:2222
92.189.214.236:2222
188.48.85.14:995
175.139.207.179:2222
75.115.14.189:443
27.0.48.233:443
103.252.7.228:443
12.172.173.82:50001
37.15.128.31:2222
103.141.50.151:995
108.6.249.139:443
75.143.236.149:443
185.13.180.250:443
46.24.136.17:2078
64.237.240.3:443
184.68.116.146:3389
31.167.254.199:995
66.191.69.18:995
184.68.116.146:2222
82.36.36.76:443
73.36.196.11:443
73.29.92.128:443
27.0.62.241:995
67.235.138.14:443
117.193.3.78:443
184.153.132.82:443
47.34.30.133:443
12.172.173.82:995
178.142.122.128:443
109.159.119.203:2222
81.248.77.37:2222
93.147.134.85:443
124.171.159.71:443
75.99.125.238:2222
178.153.3.212:443
103.144.201.62:2078
84.35.26.14:995
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewermgr.exepid process 5080 rundll32.exe 5080 rundll32.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe 2700 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 5080 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.execmd.exerundll32.exerundll32.exedescription pid process target process PID 1748 wrote to memory of 4908 1748 cmd.exe cmd.exe PID 1748 wrote to memory of 4908 1748 cmd.exe cmd.exe PID 4908 wrote to memory of 4872 4908 cmd.exe rundll32.exe PID 4908 wrote to memory of 4872 4908 cmd.exe rundll32.exe PID 4872 wrote to memory of 5080 4872 rundll32.exe rundll32.exe PID 4872 wrote to memory of 5080 4872 rundll32.exe rundll32.exe PID 4872 wrote to memory of 5080 4872 rundll32.exe rundll32.exe PID 5080 wrote to memory of 2700 5080 rundll32.exe wermgr.exe PID 5080 wrote to memory of 2700 5080 rundll32.exe wermgr.exe PID 5080 wrote to memory of 2700 5080 rundll32.exe wermgr.exe PID 5080 wrote to memory of 2700 5080 rundll32.exe wermgr.exe PID 5080 wrote to memory of 2700 5080 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RulesASAP_LKE7.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c PayInfo\NeedChangeRules.cmd A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 92⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32 /s directcontract.new,Updt3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32 /s directcontract.new,Updt4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2700-140-0x0000000000000000-mapping.dmp
-
memory/2700-141-0x0000000000800000-0x000000000082A000-memory.dmpFilesize
168KB
-
memory/2700-142-0x0000000000800000-0x000000000082A000-memory.dmpFilesize
168KB
-
memory/4872-133-0x0000000000000000-mapping.dmp
-
memory/4908-132-0x0000000000000000-mapping.dmp
-
memory/5080-134-0x0000000000000000-mapping.dmp
-
memory/5080-135-0x0000000001130000-0x000000000115A000-memory.dmpFilesize
168KB