Analysis
-
max time kernel
300s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 13:31
General
-
Target
ioenou.exe
-
Size
130KB
-
MD5
479c596e0459402209859913aa4280ed
-
SHA1
3786faae5946919d23631bb69c8b6a07d5775abf
-
SHA256
28f49c8ec7e739247dc8fbaa421456efb5869b1d92181d2b99c93520064cbb5f
-
SHA512
0475695a4f8933b6afdf73eb3546fba4edcc47ad01f9dc9af2910a07fb89101bd2288fa91702b95d8c4a06abbbc4fe38a3b12abbc6f622a00d4c2400c9dac9ff
-
SSDEEP
3072:608q9D1i4yfNwvcKgi1AvuJ4I/YzTBfQzcoG5y:cfiEKxGvuJL/YzTBozcoG5y
Malware Config
Extracted
qakbot
404.1377
snow09
1686740620
101.184.155.156:2222
89.79.229.50:443
173.17.45.60:443
124.246.122.199:2222
84.215.202.8:443
122.184.143.86:443
79.168.224.165:2222
151.62.174.154:443
124.122.47.148:443
31.190.240.11:443
92.239.81.124:443
31.53.29.210:2222
172.115.17.50:443
70.28.50.223:2083
64.121.161.102:443
187.199.244.117:32103
91.68.227.219:443
176.142.207.63:443
47.199.241.39:443
89.129.109.27:2222
67.87.119.216:2078
98.4.43.111:443
200.93.25.6:2222
142.188.88.42:2222
86.128.15.251:2222
201.244.108.183:995
74.12.146.45:2083
151.65.167.77:443
41.228.224.205:995
86.129.138.170:443
113.11.92.30:443
12.172.173.82:2087
72.205.104.134:443
84.213.236.225:995
92.186.69.229:2222
1.221.179.74:443
103.141.50.43:995
58.162.223.233:443
96.242.126.116:2222
51.11.214.101:2222
75.109.111.89:443
125.99.76.102:443
80.12.88.148:2222
109.149.147.195:2222
27.99.32.26:2222
70.28.50.223:3389
70.28.50.223:32100
86.97.96.62:2222
66.241.183.99:443
74.12.146.45:2222
190.199.147.209:2222
47.205.25.170:443
12.172.173.82:993
12.172.173.82:22
84.35.26.14:995
72.134.124.16:443
85.240.173.251:2078
50.68.186.195:443
65.190.242.244:443
45.62.75.217:443
203.109.44.236:995
174.58.146.57:443
105.184.159.9:995
94.207.115.105:443
197.0.146.211:443
197.204.11.218:443
92.9.45.20:2222
91.169.12.198:32100
12.172.173.82:20
70.64.77.115:443
71.31.9.49:995
24.234.220.88:990
95.45.50.93:2222
213.91.235.146:443
189.223.184.79:443
213.64.33.92:2222
47.34.30.133:443
70.28.50.223:2087
12.172.173.82:465
67.219.197.94:443
103.140.174.20:2222
12.172.173.82:995
90.29.86.138:2222
37.14.229.220:2222
89.181.227.42:2222
62.35.230.21:995
70.160.67.203:443
88.126.94.4:50000
203.219.204.180:443
147.219.4.194:443
92.20.204.198:2222
24.234.220.88:993
188.28.19.84:443
89.115.200.234:443
67.87.119.216:2083
86.98.222.20:443
161.142.100.114:995
103.139.242.6:443
103.123.223.153:443
24.234.220.88:995
102.158.231.164:443
175.156.65.126:2222
41.227.190.59:443
178.175.187.254:443
180.151.13.23:2078
12.172.173.82:50001
116.75.63.143:443
78.192.109.105:2222
37.186.55.8:2222
121.121.100.202:995
104.35.24.154:443
199.27.66.213:443
181.165.19.254:443
81.229.117.95:2222
12.172.173.82:21
45.2.61.134:3389
162.248.14.107:443
103.212.19.254:995
2.82.8.80:443
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ioenou.exewermgr.exepid Process 2196 ioenou.exe 2196 ioenou.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe 4268 wermgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid Process Token: SeManageVolumePrivilege 3116 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ioenou.exedescription pid Process procid_target PID 2196 wrote to memory of 4268 2196 ioenou.exe 86 PID 2196 wrote to memory of 4268 2196 ioenou.exe 86 PID 2196 wrote to memory of 4268 2196 ioenou.exe 86 PID 2196 wrote to memory of 4268 2196 ioenou.exe 86 PID 2196 wrote to memory of 4268 2196 ioenou.exe 86 PID 2196 wrote to memory of 4268 2196 ioenou.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ioenou.exe"C:\Users\Admin\AppData\Local\Temp\ioenou.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2196
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5198e6e13c85463164d278650be48fd33
SHA1b871b7b2ac23aa0d03775494a43f00b713e9848f
SHA25668a1d8c4b9ce251731d6c8b596dcb7c60b23b8127f7e7d0521f2f00e0de843ed
SHA5128454ed8b23da2ff5a475f5af5c0abab5bbece1b591db5cc7db99a20568f7aaf7c344231b913bd0cbe5dc8f2fec2b5ae43cfe71d59f20c5be857d0ca5e744a061