Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
ConvertiblyBriskish.dll
Resource
win7-20230220-en
General
-
Target
ConvertiblyBriskish.dll
-
Size
869KB
-
MD5
33c6c81620ad583916379499e47da4e0
-
SHA1
a1f947fad1f40273496f0a9c469e624d04fbe63a
-
SHA256
66416ebc59241a78024b8fa0b8fc376d66ed5e0f818aebccf8260c6a51bae9fd
-
SHA512
7138a97b701bcfd596f4e9932ea98fef0c6a6b57a250b3e9db654475acd53aca2b2773b844b83a00afb1217efa241cc3018727b4f3870061066d9b21a705947a
-
SSDEEP
24576:D9sT4pp4P7Empue12E35Tdkq0aljWrHnl5oPhepzGIrx1lA0id6H/Ne:2QeD0nEZAl/i
Malware Config
Extracted
qakbot
404.450
BB19
1679045844
202.142.98.62:443
50.68.204.71:995
81.229.117.95:2222
103.140.174.19:2222
47.34.30.133:443
76.170.252.153:995
183.87.163.165:443
81.133.163.79:2222
83.92.85.93:443
85.241.180.94:443
144.64.226.144:443
76.80.180.154:995
103.42.86.110:995
12.172.173.82:995
24.117.237.157:443
35.143.97.145:995
91.254.229.61:443
74.58.71.237:443
64.237.245.195:443
45.50.233.214:443
103.252.7.231:443
178.175.187.254:443
12.172.173.82:465
72.80.7.6:50003
184.153.132.82:443
82.155.108.153:443
71.65.145.108:443
49.245.82.178:2222
12.172.173.82:32101
77.86.98.236:443
92.1.170.110:995
174.4.89.3:443
190.191.35.122:443
75.143.236.149:443
50.68.204.71:993
202.142.98.62:995
86.98.17.65:443
80.42.186.99:2222
180.151.104.240:443
50.68.204.71:443
116.75.63.7:443
93.147.134.85:443
27.61.191.67:443
92.149.250.113:2222
73.165.119.20:443
69.133.162.35:443
74.92.243.113:50000
12.172.173.82:20
92.27.86.48:2222
162.248.14.107:443
175.143.63.68:2222
47.61.11.253:2078
213.67.255.57:2222
103.231.216.238:443
86.190.223.11:2222
2.98.147.157:995
174.104.184.149:443
197.148.17.17:2078
213.91.235.146:443
198.2.51.242:993
87.221.197.44:2222
86.97.85.42:2222
31.53.29.195:2222
217.165.247.145:2222
72.203.216.98:2222
76.71.137.91:2222
122.184.143.86:443
71.171.83.69:443
86.195.14.72:2222
92.154.45.81:2222
90.55.105.42:2222
2.14.137.60:2222
82.127.172.214:2222
87.243.146.59:443
184.176.35.223:2222
98.145.23.67:443
91.2.135.211:995
201.244.108.183:995
86.191.9.6:995
102.159.216.44:443
202.187.87.178:995
24.178.201.230:2222
114.143.176.235:443
86.225.214.138:2222
74.66.134.24:443
80.12.88.148:2222
201.210.105.249:2222
70.53.96.223:995
186.64.67.54:443
86.176.144.240:2222
197.14.148.149:443
12.172.173.82:50001
71.46.234.171:443
91.68.227.219:443
78.159.144.244:995
123.3.240.16:995
95.242.101.251:995
12.172.173.82:993
83.114.60.6:2222
89.79.229.50:443
89.129.109.27:2222
12.172.173.82:22
80.76.163.207:2222
103.111.70.115:995
70.51.152.61:2222
157.119.85.203:443
86.196.12.21:2222
86.130.9.213:2222
92.159.173.52:2222
73.36.196.11:443
85.61.165.153:2222
103.123.223.132:443
171.96.204.10:443
105.186.191.244:995
88.126.94.4:50000
94.5.98.77:443
90.104.22.28:2222
12.172.173.82:2087
31.48.18.52:443
99.253.131.148:443
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4684 rundll32.exe 4684 rundll32.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe 32 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4684 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1296 wrote to memory of 4684 1296 rundll32.exe 88 PID 1296 wrote to memory of 4684 1296 rundll32.exe 88 PID 1296 wrote to memory of 4684 1296 rundll32.exe 88 PID 4684 wrote to memory of 32 4684 rundll32.exe 89 PID 4684 wrote to memory of 32 4684 rundll32.exe 89 PID 4684 wrote to memory of 32 4684 rundll32.exe 89 PID 4684 wrote to memory of 32 4684 rundll32.exe 89 PID 4684 wrote to memory of 32 4684 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ConvertiblyBriskish.dll,WW501⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ConvertiblyBriskish.dll,WW502⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-