Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
444444.exe
Resource
win7-20230831-en
General
-
Target
444444.exe
-
Size
720KB
-
MD5
1692df185b5b6c07a50b271118114c83
-
SHA1
f7456d027f7742aecb39ef0125cb13096f908a7e
-
SHA256
aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
-
SHA512
d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
SSDEEP
12288:avKd+uePR25zgtEAjSfUO8l6ilUPpzfDpwlwwFpomqptfUpOlC+v1:IKd+z28EA4UOHqgTDpwlpPzutf5CA
Malware Config
Extracted
qakbot
323.108
spx49
1577446119
173.80.61.90:443
72.28.255.159:443
5.182.39.156:443
138.122.5.214:2222
47.23.101.26:465
72.190.101.70:443
208.126.142.17:443
72.224.159.224:2222
75.110.90.106:443
66.214.75.176:443
45.45.105.94:995
117.223.146.238:995
71.226.140.73:443
71.30.56.170:443
50.247.230.33:995
173.3.132.17:995
24.229.245.124:995
45.45.105.94:443
173.79.220.156:443
104.35.127.108:2222
24.32.119.146:443
130.93.11.211:443
78.94.55.26:50003
192.40.225.168:443
12.5.37.3:443
74.134.35.54:443
12.5.37.3:995
174.82.131.155:995
72.45.14.185:443
162.244.225.30:443
108.227.161.27:443
98.23.32.209:995
184.167.2.251:2222
74.222.204.82:443
152.208.21.141:443
64.19.74.29:995
144.178.134.98:995
184.74.101.234:995
66.222.88.126:995
100.4.185.8:443
173.22.120.11:2222
73.226.220.56:443
104.3.91.20:995
68.49.120.179:443
98.252.150.180:443
67.214.21.207:443
47.180.66.10:443
70.124.29.226:443
67.10.18.112:993
173.31.178.20:443
75.131.72.82:995
74.73.122.214:443
2.50.157.233:443
64.250.55.239:443
70.174.21.130:443
201.152.109.147:995
181.126.80.118:443
184.101.228.131:443
104.152.16.45:995
70.120.151.69:443
76.180.69.236:443
106.51.148.162:443
74.77.145.53:443
138.122.5.214:443
206.51.202.106:50002
75.110.250.89:443
162.244.224.166:443
72.16.212.107:465
75.131.72.82:443
66.31.96.223:443
98.127.96.121:443
172.242.9.118:995
68.186.198.131:443
24.189.222.222:2222
96.242.232.231:443
104.191.66.184:443
64.203.122.88:995
24.121.254.171:443
69.47.44.219:443
68.174.15.223:443
207.179.194.91:443
68.238.56.27:443
23.240.185.215:443
98.237.120.65:995
24.191.227.91:2222
50.34.101.94:443
172.78.87.180:443
100.38.123.22:443
189.140.111.214:995
98.118.162.34:443
174.101.35.214:443
185.219.83.73:443
98.213.35.176:443
50.246.229.50:443
50.78.93.74:995
72.211.97.57:443
100.40.48.96:443
104.173.119.54:2222
184.180.157.203:2222
67.246.16.250:995
86.169.244.41:2222
68.225.250.136:443
32.208.1.239:443
74.33.70.219:443
76.23.204.29:443
197.86.194.104:995
46.248.40.117:995
2.190.214.254:443
71.80.227.238:443
174.48.72.160:443
74.71.216.1:443
98.121.187.78:443
75.121.10.204:443
71.77.231.251:443
108.183.200.239:443
68.100.248.78:443
97.96.51.117:443
24.202.42.48:2222
173.172.205.216:443
24.201.79.208:2078
107.12.131.249:443
75.81.25.223:995
74.194.4.181:443
72.187.35.131:443
75.70.218.193:443
69.207.20.233:443
68.39.177.147:995
100.19.124.139:443
75.165.181.122:443
205.250.79.62:443
62.103.70.217:995
47.227.198.155:443
72.29.181.77:2078
47.146.169.85:443
181.123.59.111:443
75.130.117.134:443
181.197.195.138:995
96.227.138.53:443
98.30.99.15:443
166.62.180.194:2078
207.178.109.161:443
174.20.189.226:995
47.153.115.154:995
83.76.204.98:2222
23.134.176.126:443
172.221.45.151:443
206.255.41.196:443
47.40.244.237:443
75.164.48.168:443
184.191.62.78:443
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1164 jbvofz.exe 4996 jbvofz.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 444444.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service jbvofz.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service jbvofz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 444444.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc 444444.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service 444444.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 444444.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 444444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 jbvofz.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc jbvofz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 jbvofz.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc jbvofz.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 5036 444444.exe 5036 444444.exe 3520 444444.exe 3520 444444.exe 3520 444444.exe 3520 444444.exe 1164 jbvofz.exe 1164 jbvofz.exe 4996 jbvofz.exe 4996 jbvofz.exe 4996 jbvofz.exe 4996 jbvofz.exe 1704 mobsync.exe 1704 mobsync.exe 1704 mobsync.exe 1704 mobsync.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1164 jbvofz.exe 1164 jbvofz.exe 1164 jbvofz.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3520 5036 444444.exe 87 PID 5036 wrote to memory of 3520 5036 444444.exe 87 PID 5036 wrote to memory of 3520 5036 444444.exe 87 PID 5036 wrote to memory of 1164 5036 444444.exe 96 PID 5036 wrote to memory of 1164 5036 444444.exe 96 PID 5036 wrote to memory of 1164 5036 444444.exe 96 PID 5036 wrote to memory of 4944 5036 444444.exe 97 PID 5036 wrote to memory of 4944 5036 444444.exe 97 PID 5036 wrote to memory of 4944 5036 444444.exe 97 PID 1164 wrote to memory of 4996 1164 jbvofz.exe 101 PID 1164 wrote to memory of 4996 1164 jbvofz.exe 101 PID 1164 wrote to memory of 4996 1164 jbvofz.exe 101 PID 1164 wrote to memory of 3952 1164 jbvofz.exe 103 PID 1164 wrote to memory of 3952 1164 jbvofz.exe 103 PID 1164 wrote to memory of 3952 1164 jbvofz.exe 103 PID 1164 wrote to memory of 3952 1164 jbvofz.exe 103 PID 1164 wrote to memory of 664 1164 jbvofz.exe 105 PID 1164 wrote to memory of 664 1164 jbvofz.exe 105 PID 1164 wrote to memory of 664 1164 jbvofz.exe 105 PID 1164 wrote to memory of 664 1164 jbvofz.exe 105 PID 1164 wrote to memory of 1704 1164 jbvofz.exe 107 PID 1164 wrote to memory of 1704 1164 jbvofz.exe 107 PID 1164 wrote to memory of 1704 1164 jbvofz.exe 107 PID 1164 wrote to memory of 1704 1164 jbvofz.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\444444.exe"C:\Users\Admin\AppData\Local\Temp\444444.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\444444.exeC:\Users\Admin\AppData\Local\Temp\444444.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wkcusolxon\jbvofz.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wkcusolxon\jbvofz.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Roaming\Microsoft\Wkcusolxon\jbvofz.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wkcusolxon\jbvofz.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:3952
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:664
-
-
C:\Windows\SysWOW64\mobsync.exeC:\Windows\SysWOW64\mobsync.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn bdeheoqge /tr "\"C:\Users\Admin\AppData\Local\Temp\444444.exe\" /I bdeheoqge" /SC ONCE /Z /ST 21:45 /ET 21:572⤵
- Creates scheduled task(s)
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD59412b1f648fa8cde3c0a388d839bccad
SHA1d145b84726a2811663c7bba3264df819a53ff9d9
SHA2562e80eeed30efc20bcbeeb7d264b1d4b88f890b77c053cd5eb5cdaf927c6e6d63
SHA51297d6a228ca0f9dab4a733ef37cabf02b34565b878e4e4a9c54f2b7b9b11d2c130843ed45c2e59b7900f48b7fb4af6088dabc2c8b0467df3ad2ade208c3f16c2f
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b
-
Filesize
720KB
MD51692df185b5b6c07a50b271118114c83
SHA1f7456d027f7742aecb39ef0125cb13096f908a7e
SHA256aa1fd9936567ccfbd41480838cf5eb4f5d74567993aa0aea1df06f03390cd326
SHA512d083d8a2fed8a8864cb4bb5b90077c04512b1d7bcba39e18f4ced9574d36f3b0561d61a1d367a464500db2d219325611c35e31f215b829edc934892918927b1b