Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 20:08
Behavioral task
behavioral1
Sample
2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe
Resource
win7-20240903-en
General
-
Target
2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe
-
Size
4.7MB
-
MD5
eead9a03b396523c7f6ab6a44d711617
-
SHA1
1491e5d862a98174441b532b77d9c0c97f1259c2
-
SHA256
2d33010e37e78fbb3ec9f8c89a73207f2e3ff0ab69e1d40261006c6c414c5397
-
SHA512
b5ec90d6c11b64fd4ba80151f8c9206b0b450109dec05c939f4dfd584b26e717c997a7c30996f5e08fed9f140935446a902d6ac74ddf4997237f9b347d80d724
-
SSDEEP
49152:a2V7djp+oE2ZjHoZB6EZ88JUUXIEABMRviTURcx:a2V7NpW6Y6joUV
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
121.88.5.181
112.223.217.101
Signatures
-
Urelas family
-
Executes dropped EXE 2 IoCs
Processes:
sander.exectfmom.exepid Process 1224 sander.exe 3016 ctfmom.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exesander.exepid Process 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 1224 sander.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.execmd.exesander.exectfmom.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sander.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ctfmom.exepid Process 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe 3016 ctfmom.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exesander.exedescription pid Process procid_target PID 2908 wrote to memory of 1224 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 28 PID 2908 wrote to memory of 1224 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 28 PID 2908 wrote to memory of 1224 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 28 PID 2908 wrote to memory of 1224 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 28 PID 2908 wrote to memory of 2272 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 29 PID 2908 wrote to memory of 2272 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 29 PID 2908 wrote to memory of 2272 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 29 PID 2908 wrote to memory of 2272 2908 2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe 29 PID 1224 wrote to memory of 3016 1224 sander.exe 33 PID 1224 wrote to memory of 3016 1224 sander.exe 33 PID 1224 wrote to memory of 3016 1224 sander.exe 33 PID 1224 wrote to memory of 3016 1224 sander.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-23_eead9a03b396523c7f6ab6a44d711617_magniber_qakbot.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331B
MD552b0348cc9241da384c56284baaf4f06
SHA1c11ac9521b3494bda57376929a6930e8db9291f0
SHA256f477fdbc217b493271c0298596cbaa96cfe74f82eca191bf44d7d56307462c65
SHA512d0a5f71dab429ca3ff113015fa7378d9ff68c9653be836d3f1089da7d8f1dac120888b29e59fe5456b3efa3d58e9848714bbee6f633bf3edcbb97ecdf1093aec
-
Filesize
221KB
MD5ab2c622792cf85cdf0bcfe7ec5944c71
SHA113924b75d2e2e093a97f552f44ea298e56d14c30
SHA256aebb49fe8a2cac9db6655a408dc93f44640702e6d9bbacfe55f27e096316c581
SHA512890df3e1cb8686a6fbc47374abbf956e05431f020f364679f0995d30c39f28b45a0d04795ed89be060dd8e17c03dcd1c8bb5ddcf8c28061f2f4182b3a26b81c0
-
Filesize
512B
MD504113afab96ff36e7da4cabf336079cf
SHA12ab6a01f123c1ef4227cb134612749b67a237bf6
SHA2568b3cc0c31002ffa60f497966a671ff1c0a23a6efa831bd2be2cfbee7588bac16
SHA51268358e6ae577e59dd540c31d4cfcf56968d9b84416ffcd527867711165d78a9f351da0bf41afab96107b1dc736467b092f5b79be2b8f7f96f6871e4a0b5472e9
-
Filesize
4.7MB
MD5b254df1217e1f4fa5ae5ea0c21a56b8b
SHA1bd9a81d92b8aca18c33ae08492c4e40577edba48
SHA25693a61447ddd230f92c9ee8d2e765b956472e7cf8131fcaf78611c7ba5c564e39
SHA51290280ba7c2ffd4b04179655d54d24546e117db65316c1b99b8e2fa0a02a42f867824e32395c6163b9263c448fd4052d3d491fc359dfda6348aa47cdaf15a5d42