Analysis
-
max time kernel
259s -
max time network
316s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:05
Static task
static1
Behavioral task
behavioral1
Sample
444444.exe
Resource
win7-20230831-en
General
-
Target
444444.exe
-
Size
720KB
-
MD5
1692df185b5b6c07a50b271118114c83
-
SHA1
f7456d027f7742aecb39ef0125cb13096f908a7e
-
SHA256
aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
-
SHA512
d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
SSDEEP
12288:avKd+uePR25zgtEAjSfUO8l6ilUPpzfDpwlwwFpomqptfUpOlC+v1:IKd+z28EA4UOHqgTDpwlpPzutf5CA
Malware Config
Extracted
qakbot
323.108
spx49
1577446119
173.80.61.90:443
72.28.255.159:443
5.182.39.156:443
138.122.5.214:2222
47.23.101.26:465
72.190.101.70:443
208.126.142.17:443
72.224.159.224:2222
75.110.90.106:443
66.214.75.176:443
45.45.105.94:995
117.223.146.238:995
71.226.140.73:443
71.30.56.170:443
50.247.230.33:995
173.3.132.17:995
24.229.245.124:995
45.45.105.94:443
173.79.220.156:443
104.35.127.108:2222
24.32.119.146:443
130.93.11.211:443
78.94.55.26:50003
192.40.225.168:443
12.5.37.3:443
74.134.35.54:443
12.5.37.3:995
174.82.131.155:995
72.45.14.185:443
162.244.225.30:443
108.227.161.27:443
98.23.32.209:995
184.167.2.251:2222
74.222.204.82:443
152.208.21.141:443
64.19.74.29:995
144.178.134.98:995
184.74.101.234:995
66.222.88.126:995
100.4.185.8:443
173.22.120.11:2222
73.226.220.56:443
104.3.91.20:995
68.49.120.179:443
98.252.150.180:443
67.214.21.207:443
47.180.66.10:443
70.124.29.226:443
67.10.18.112:993
173.31.178.20:443
75.131.72.82:995
74.73.122.214:443
2.50.157.233:443
64.250.55.239:443
70.174.21.130:443
201.152.109.147:995
181.126.80.118:443
184.101.228.131:443
104.152.16.45:995
70.120.151.69:443
76.180.69.236:443
106.51.148.162:443
74.77.145.53:443
138.122.5.214:443
206.51.202.106:50002
75.110.250.89:443
162.244.224.166:443
72.16.212.107:465
75.131.72.82:443
66.31.96.223:443
98.127.96.121:443
172.242.9.118:995
68.186.198.131:443
24.189.222.222:2222
96.242.232.231:443
104.191.66.184:443
64.203.122.88:995
24.121.254.171:443
69.47.44.219:443
68.174.15.223:443
207.179.194.91:443
68.238.56.27:443
23.240.185.215:443
98.237.120.65:995
24.191.227.91:2222
50.34.101.94:443
172.78.87.180:443
100.38.123.22:443
189.140.111.214:995
98.118.162.34:443
174.101.35.214:443
185.219.83.73:443
98.213.35.176:443
50.246.229.50:443
50.78.93.74:995
72.211.97.57:443
100.40.48.96:443
104.173.119.54:2222
184.180.157.203:2222
67.246.16.250:995
86.169.244.41:2222
68.225.250.136:443
32.208.1.239:443
74.33.70.219:443
76.23.204.29:443
197.86.194.104:995
46.248.40.117:995
2.190.214.254:443
71.80.227.238:443
174.48.72.160:443
74.71.216.1:443
98.121.187.78:443
75.121.10.204:443
71.77.231.251:443
108.183.200.239:443
68.100.248.78:443
97.96.51.117:443
24.202.42.48:2222
173.172.205.216:443
24.201.79.208:2078
107.12.131.249:443
75.81.25.223:995
74.194.4.181:443
72.187.35.131:443
75.70.218.193:443
69.207.20.233:443
68.39.177.147:995
100.19.124.139:443
75.165.181.122:443
205.250.79.62:443
62.103.70.217:995
47.227.198.155:443
72.29.181.77:2078
47.146.169.85:443
181.123.59.111:443
75.130.117.134:443
181.197.195.138:995
96.227.138.53:443
98.30.99.15:443
166.62.180.194:2078
207.178.109.161:443
174.20.189.226:995
47.153.115.154:995
83.76.204.98:2222
23.134.176.126:443
172.221.45.151:443
206.255.41.196:443
47.40.244.237:443
75.164.48.168:443
184.191.62.78:443
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
roveaguj.exeroveaguj.exepid Process 2620 roveaguj.exe 2568 roveaguj.exe -
Loads dropped DLL 2 IoCs
Processes:
444444.exeroveaguj.exepid Process 2516 444444.exe 2620 roveaguj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\dhvowhwl = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Fphuwcfwritq\\roveaguj.exe\"" explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
444444.exe444444.exeroveaguj.exeroveaguj.exeexplorer.exepid Process 2516 444444.exe 2536 444444.exe 2536 444444.exe 2620 roveaguj.exe 2568 roveaguj.exe 2568 roveaguj.exe 1864 explorer.exe 1864 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
roveaguj.exepid Process 2620 roveaguj.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
444444.exeroveaguj.exedescription pid Process procid_target PID 2516 wrote to memory of 2536 2516 444444.exe 27 PID 2516 wrote to memory of 2536 2516 444444.exe 27 PID 2516 wrote to memory of 2536 2516 444444.exe 27 PID 2516 wrote to memory of 2536 2516 444444.exe 27 PID 2516 wrote to memory of 2620 2516 444444.exe 28 PID 2516 wrote to memory of 2620 2516 444444.exe 28 PID 2516 wrote to memory of 2620 2516 444444.exe 28 PID 2516 wrote to memory of 2620 2516 444444.exe 28 PID 2620 wrote to memory of 2568 2620 roveaguj.exe 29 PID 2620 wrote to memory of 2568 2620 roveaguj.exe 29 PID 2620 wrote to memory of 2568 2620 roveaguj.exe 29 PID 2620 wrote to memory of 2568 2620 roveaguj.exe 29 PID 2516 wrote to memory of 2492 2516 444444.exe 30 PID 2516 wrote to memory of 2492 2516 444444.exe 30 PID 2516 wrote to memory of 2492 2516 444444.exe 30 PID 2516 wrote to memory of 2492 2516 444444.exe 30 PID 2620 wrote to memory of 1864 2620 roveaguj.exe 31 PID 2620 wrote to memory of 1864 2620 roveaguj.exe 31 PID 2620 wrote to memory of 1864 2620 roveaguj.exe 31 PID 2620 wrote to memory of 1864 2620 roveaguj.exe 31 PID 2620 wrote to memory of 1864 2620 roveaguj.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\444444.exe"C:\Users\Admin\AppData\Local\Temp\444444.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\444444.exeC:\Users\Admin\AppData\Local\Temp\444444.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Fphuwcfwritq\roveaguj.exeC:\Users\Admin\AppData\Roaming\Microsoft\Fphuwcfwritq\roveaguj.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\Microsoft\Fphuwcfwritq\roveaguj.exeC:\Users\Admin\AppData\Roaming\Microsoft\Fphuwcfwritq\roveaguj.exe /C3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn shngvoqk /tr "\"C:\Users\Admin\AppData\Local\Temp\444444.exe\" /I shngvoqk" /SC ONCE /Z /ST 21:45 /ET 21:572⤵
- Creates scheduled task(s)
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5f98d71431ea51c2acacfcd996d65303e
SHA1a19bcfcd8f7d7239c7f8d8170b0494959b948ba1
SHA256c3107a27c219c2d6dcb068c6da22941a1c62a6feb8771c48e0e80cda80cafebb
SHA51242827bd6fe3f0d6bfc861b65d68d51e0de25e7f0ffcae814501a3d0f7cd6534f9d1f96b1e598345f046ebe4a5857506dbab4f929ca5337487a45910d2665429d
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b