Analysis
-
max time kernel
149s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 20:28
Behavioral task
behavioral1
Sample
2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe
Resource
win7-20240729-en
General
-
Target
2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe
-
Size
4.7MB
-
MD5
5381e8088a4d5443a40e1316522f8b79
-
SHA1
6004d42dc5828991c18bce4d18b03991d04b39f5
-
SHA256
135807bfc79183f8064315a6b2086ee0933d1f5b44c1e3ab20fbe9824ece90a4
-
SHA512
9438062848f45b92442e68ec86c5273823af740f64c142b353b19f057d1d607f96021595c573fa3ad319b9a27513f70ee4263f22b1e2115f335305c6026ee5b4
-
SSDEEP
49152:a2V7djp+oE2ZjHoZB6EZ88JUUXIEABMRviTURcI:a2V7NpW6Y6joUE
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
121.88.5.181
112.223.217.101
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2984 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
sander.exectfmom.exepid Process 1448 sander.exe 1032 ctfmom.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exesander.exepid Process 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 1448 sander.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.execmd.exesander.exectfmom.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sander.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ctfmom.exepid Process 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe 1032 ctfmom.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exesander.exedescription pid Process procid_target PID 1464 wrote to memory of 1448 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 30 PID 1464 wrote to memory of 1448 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 30 PID 1464 wrote to memory of 1448 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 30 PID 1464 wrote to memory of 1448 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 30 PID 1464 wrote to memory of 2984 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 31 PID 1464 wrote to memory of 2984 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 31 PID 1464 wrote to memory of 2984 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 31 PID 1464 wrote to memory of 2984 1464 2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe 31 PID 1448 wrote to memory of 1032 1448 sander.exe 34 PID 1448 wrote to memory of 1032 1448 sander.exe 34 PID 1448 wrote to memory of 1032 1448 sander.exe 34 PID 1448 wrote to memory of 1032 1448 sander.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-01_5381e8088a4d5443a40e1316522f8b79_magniber_qakbot.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331B
MD522ba921d8d6e205aa419a60f87ef19e7
SHA1e71bb89d34222ecf12d71df76adde48e7dada0c2
SHA2565d70927cbabdbcd2a4a39085911bc322ffafd29b33b3191298a9d4bc0683fd6c
SHA512726c2247b86e3364b7a6c4f77f5d94ba35be38b98c09880ea1044c45fee18a6ffe6de1ebf8c4717375d956e5e8ad2125deb9a3f3680a661baddedfc220a4aa64
-
Filesize
512B
MD504113afab96ff36e7da4cabf336079cf
SHA12ab6a01f123c1ef4227cb134612749b67a237bf6
SHA2568b3cc0c31002ffa60f497966a671ff1c0a23a6efa831bd2be2cfbee7588bac16
SHA51268358e6ae577e59dd540c31d4cfcf56968d9b84416ffcd527867711165d78a9f351da0bf41afab96107b1dc736467b092f5b79be2b8f7f96f6871e4a0b5472e9
-
Filesize
221KB
MD54b6d4da0d000bcde5eef72c71b26489e
SHA111a8d1606d3e917f42d1126e945887e22b0139fe
SHA25660838ae7ba0a28f44d340d561da56aea067c1938beac879f2f50fb311284d984
SHA512a4ba8b6290f8f3e1d637fe846b77d009c05fa94e7b4318d0d08e1c0839a75e1fcd492eccbb77cbdd3cddeb780e3ca1dada80152818cad07e45149469f72040af
-
Filesize
4.7MB
MD51d4b58620c7834798ddade096c11831e
SHA134aa6b6f1f8800476411dd82c5a9bf7a79966fb4
SHA2569da6299e1021883e91f8732dd00fe0ad00d60b99cb03e8774884e41fc8a8ab04
SHA51207cf29730e02585178801379b72eba43553ca91b12e11f1491316b27ad660e24aa570e1155a896e17b0dff67b80d9ca108333dbc380605ddef356b028728daad