Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe
Resource
win7-20241010-en
General
-
Target
fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe
-
Size
343KB
-
MD5
68edc294607e005b4c612aadfa7e0130
-
SHA1
2c010769008367d0d913216e3e812f673d7345a4
-
SHA256
fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6
-
SHA512
bdcbad993d04614ce72be362ae94f597a729974a35b25af3093e0d37c0450ed3a41c77bc2c474ab8ad702b004fee79ddecd82909692ecd250d4d53e48878ff9b
-
SSDEEP
6144:Ats86UY9Pnx5aQULfR4HipJGQs0ltFZEHOW9Pnz1UVQo7E/MWFeZi/m6h0:ACjL9PnaQUjKKFBlDZEHOGhwQo7E/mZ3
Malware Config
Extracted
qakbot
325.59
abc028
1605010939
86.98.145.152:2222
90.101.117.122:2222
94.69.112.148:2222
81.150.181.168:2222
82.127.125.209:2222
86.140.82.116:20
81.214.126.173:2222
172.87.157.235:443
176.181.247.197:443
41.206.131.156:443
82.127.125.209:990
81.133.234.36:2222
197.45.110.165:995
37.6.222.192:995
86.97.162.141:2222
37.116.152.122:2222
92.154.83.96:1194
101.189.22.159:2222
74.129.26.119:443
59.99.38.231:443
92.96.125.232:2222
49.245.26.97:2222
67.82.244.199:2222
37.210.133.110:443
108.30.125.94:443
94.52.160.116:443
2.50.29.248:995
45.63.107.192:995
190.220.8.10:443
45.32.154.10:443
2.50.89.119:995
45.63.107.192:2222
199.247.22.145:443
45.63.107.192:443
207.246.75.201:443
189.183.201.0:443
80.240.26.178:443
199.247.16.80:443
47.22.148.6:443
50.82.55.69:443
75.136.40.155:443
68.186.192.69:443
71.187.170.235:443
2.50.244.155:443
196.204.207.111:443
80.14.209.42:2222
78.132.115.83:6881
185.163.221.77:2222
41.206.131.166:443
98.118.156.172:443
108.52.39.68:443
180.233.150.134:443
24.27.82.216:2222
95.77.144.238:443
2.50.143.154:2222
73.166.10.38:443
84.232.252.202:2222
118.40.124.211:443
148.75.231.53:443
66.114.26.73:443
68.46.142.48:995
108.46.145.30:443
47.146.39.147:443
41.234.229.219:995
69.40.22.180:443
149.28.99.97:995
149.28.99.97:443
73.239.229.107:995
71.187.177.20:443
161.142.217.62:443
50.244.112.90:443
188.25.162.109:443
67.61.157.208:443
149.28.99.97:2222
2.50.110.49:2078
93.86.252.177:995
68.174.15.223:443
41.205.16.176:443
84.117.176.32:443
217.133.54.140:32100
185.105.131.233:443
87.27.110.90:2222
77.159.149.74:443
105.101.88.222:443
185.246.9.69:995
2.90.127.64:443
41.225.13.128:8443
105.198.236.101:443
190.220.8.10:995
197.161.154.132:443
117.199.12.148:443
201.152.3.15:995
31.5.21.66:443
184.55.32.182:443
83.110.12.0:2222
47.138.200.182:443
96.21.251.127:2222
98.116.20.194:443
39.32.61.193:995
109.205.204.229:2222
198.2.35.226:2222
156.205.170.226:995
41.227.93.43:443
89.136.39.108:443
78.96.199.79:443
63.155.67.114:995
24.90.129.73:443
188.27.32.167:443
151.72.137.121:443
122.60.99.107:443
96.41.93.96:443
109.209.94.165:2222
189.231.189.64:443
86.122.246.127:2222
41.236.216.64:995
45.63.104.123:443
58.179.21.147:995
2.51.153.24:443
95.179.247.224:443
5.15.225.109:443
45.32.162.253:443
149.135.101.20:443
74.135.122.35:443
207.246.70.216:443
96.30.198.161:443
94.52.68.72:443
45.32.165.134:443
82.127.125.209:22
140.82.27.132:443
144.139.230.139:443
197.86.204.198:443
89.137.211.239:443
197.47.160.202:995
24.137.76.62:995
86.248.30.56:2222
212.70.107.59:995
2.7.202.106:2222
72.36.59.46:2222
71.238.211.125:443
81.97.154.100:443
2.181.78.140:2222
47.44.217.98:443
120.151.95.167:443
65.131.22.219:995
79.172.26.240:443
93.113.177.152:443
47.40.78.73:443
92.59.35.196:2083
79.167.68.188:2222
Signatures
-
Qakbot family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3888 cmd.exe 3896 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3896 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2816 fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe 2816 fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3888 2816 fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe 83 PID 2816 wrote to memory of 3888 2816 fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe 83 PID 2816 wrote to memory of 3888 2816 fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe 83 PID 3888 wrote to memory of 3896 3888 cmd.exe 85 PID 3888 wrote to memory of 3896 3888 cmd.exe 85 PID 3888 wrote to memory of 3896 3888 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe"C:\Users\Admin\AppData\Local\Temp\fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\fe76123b984d98fbe36963eb9cb54901a78038db8d574b5e5b95fbb8bf3809c6N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3896
-
-