Overview
overview
10Static
static
1KYC.lnk
windows7-x64
10KYC.lnk
windows10-2004-x64
10tropically...ng.dll
windows7-x64
10tropically...ng.dll
windows10-2004-x64
10tropically...rs.cmd
windows7-x64
1tropically...rs.cmd
windows10-2004-x64
1tropically...es.cmd
windows7-x64
1tropically...es.cmd
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28/02/2023, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
KYC.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
KYC.lnk
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
tropically/blanketing.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
tropically/blanketing.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
tropically/clabbers.cmd
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
tropically/clabbers.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
tropically/lattices.cmd
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
tropically/lattices.cmd
Resource
win10v2004-20230220-en
General
-
Target
KYC.lnk
-
Size
1KB
-
MD5
758344850c50f2de57d46f3890b8b622
-
SHA1
420594b6a964785d9b5d0541ffe8f3af7963c74f
-
SHA256
8cbf9a08cb190617609e0ea978f5e4eeb913b1c99089585a4c26a12a526d3d7a
-
SHA512
359e69bad4a761ce489642fcd797207f52379d9d07a4d64bcb573a47591ff68a96700e7fec1c2322b65c5146581388e15d4eacde4f96a47ff0b256d72841d3d5
Malware Config
Extracted
qakbot
404.46
obama229
1671092705
74.83.128.70:2083
184.153.132.82:443
91.96.249.3:443
69.119.123.159:2222
81.229.117.95:2222
92.189.214.236:2222
73.155.10.79:443
216.82.134.133:443
184.68.116.146:3389
12.172.173.82:995
103.55.67.180:443
73.29.92.128:443
60.254.51.168:443
86.99.14.46:2222
116.75.63.131:443
72.200.109.104:443
87.202.101.164:50000
93.24.192.142:20
176.142.207.63:443
2.50.140.56:995
41.62.43.47:443
86.98.23.199:443
92.154.17.149:2222
62.170.19.115:2222
109.150.179.181:2222
139.228.33.163:2222
24.228.132.224:2222
217.128.200.114:2222
45.248.169.101:443
217.128.91.196:2222
90.119.197.132:2222
93.147.134.85:443
128.127.21.57:443
92.185.204.18:2078
108.6.249.139:443
92.145.203.167:2222
24.206.27.39:443
178.152.25.80:443
87.57.13.215:443
75.143.236.149:443
49.245.119.12:2222
84.35.26.14:995
86.130.9.250:2222
147.148.234.231:2222
83.114.60.6:2222
213.67.255.57:2222
102.40.202.189:995
149.126.159.106:443
50.68.204.71:995
47.41.154.250:443
50.68.204.71:443
12.172.173.82:465
190.18.236.175:443
79.13.202.140:443
70.55.120.16:2222
123.3.240.16:995
70.115.104.126:995
188.48.116.37:995
87.65.160.87:995
221.161.103.6:443
27.99.45.237:2222
76.80.180.154:995
103.144.201.62:2078
72.80.7.6:995
90.104.22.28:2222
199.83.165.233:443
78.193.176.97:443
76.100.159.250:443
47.34.30.133:443
87.149.127.43:995
108.162.6.34:443
73.161.176.218:443
136.232.184.134:995
124.122.55.7:443
77.86.98.236:443
51.186.2.140:443
109.11.175.42:2222
93.156.97.145:443
88.126.94.4:50000
216.160.116.140:2222
31.167.254.199:995
217.165.234.153:443
89.129.109.27:2222
49.205.231.75:2222
96.246.158.46:995
50.68.204.71:993
216.36.153.248:443
84.219.213.130:6881
184.176.154.83:995
92.207.132.174:2222
142.161.27.232:2222
49.175.72.56:443
184.68.116.146:2078
66.191.69.18:995
90.89.95.158:2222
198.2.51.242:993
73.36.196.11:443
176.151.15.101:443
75.158.15.211:443
69.133.162.35:443
184.68.116.146:61202
12.172.173.82:21
186.64.67.55:443
162.248.14.107:443
86.225.214.138:2222
91.231.172.236:995
83.92.85.93:443
24.142.218.202:443
70.77.116.233:443
75.98.154.19:443
81.248.77.37:2222
12.172.173.82:50001
12.172.173.82:22
172.117.139.142:995
70.120.228.205:443
79.77.142.22:2222
80.44.148.126:2222
78.101.91.215:2222
181.118.206.65:995
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1652 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1792 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1792 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1652 rundll32.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe 1824 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1652 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 928 wrote to memory of 1792 928 cmd.exe 29 PID 928 wrote to memory of 1792 928 cmd.exe 29 PID 928 wrote to memory of 1792 928 cmd.exe 29 PID 928 wrote to memory of 1792 928 cmd.exe 29 PID 1792 wrote to memory of 552 1792 cmd.exe 30 PID 1792 wrote to memory of 552 1792 cmd.exe 30 PID 1792 wrote to memory of 552 1792 cmd.exe 30 PID 1792 wrote to memory of 552 1792 cmd.exe 30 PID 1792 wrote to memory of 1652 1792 cmd.exe 31 PID 1792 wrote to memory of 1652 1792 cmd.exe 31 PID 1792 wrote to memory of 1652 1792 cmd.exe 31 PID 1792 wrote to memory of 1652 1792 cmd.exe 31 PID 1792 wrote to memory of 1652 1792 cmd.exe 31 PID 1792 wrote to memory of 1652 1792 cmd.exe 31 PID 1792 wrote to memory of 1652 1792 cmd.exe 31 PID 1652 wrote to memory of 1824 1652 rundll32.exe 32 PID 1652 wrote to memory of 1824 1652 rundll32.exe 32 PID 1652 wrote to memory of 1824 1652 rundll32.exe 32 PID 1652 wrote to memory of 1824 1652 rundll32.exe 32 PID 1652 wrote to memory of 1824 1652 rundll32.exe 32 PID 1652 wrote to memory of 1824 1652 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\KYC.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /q /c tropically\clabbers.cmd2⤵
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\replace.exereplace C:\Windows\\System32\\RunDlL32.eXe C:\Users\Admin\AppData\Local\Temp /A3⤵PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\rundll32.exeRunDlL32.eXe tropically\\blanketing.sql,DrawThemeIcon3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d