Analysis
-
max time kernel
95s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 21:33
Static task
static1
Behavioral task
behavioral1
Sample
375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe
Resource
win7-20240903-en
General
-
Target
375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe
-
Size
388KB
-
MD5
8ba64166174589397392dfb389a6471a
-
SHA1
d3f2fffc6c9bb244bc6de6748103ec09f9645759
-
SHA256
375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c
-
SHA512
f3d2044c55ec41dd771c3b032734855f3a8c82f70e6ceb651e85a1e0544fd298dae025305ffbae604129d23049c480e83dad5212b7ccbd933758a38f6cc555c2
-
SSDEEP
6144:XjiJi6LQKqQ0O1K9QxeSSAN8BVHV2CIe997bOj3b:XX64QrK9QxeSSAN6VHYCOrb
Malware Config
Extracted
qakbot
324.8
1582189741
Protocol: ftp- Host:
192.185.5.208 - Port:
21 - Username:
[email protected] - Password:
NxdkxAp4dUsY
Protocol: ftp- Host:
162.241.218.118 - Port:
21 - Username:
[email protected] - Password:
EcOV0DyGVgVN
Protocol: ftp- Host:
69.89.31.139 - Port:
21 - Username:
[email protected] - Password:
fcR7OvyLrMW6!
Protocol: ftp- Host:
169.207.67.14 - Port:
21 - Username:
[email protected] - Password:
eQyicNLzzqPN
206.169.163.147:995
98.213.28.175:443
175.111.128.234:443
50.78.93.74:443
99.199.174.72:443
37.26.26.43:443
172.78.87.180:443
96.35.170.82:2222
100.40.48.96:443
47.153.115.154:995
104.3.91.20:995
69.92.54.95:995
24.32.119.146:443
71.88.220.181:443
78.56.103.184:443
86.254.93.195:2222
75.110.250.89:443
75.81.25.223:995
86.126.253.30:443
104.34.122.18:443
174.34.67.106:2222
47.216.36.60:443
184.191.62.24:995
217.162.149.212:443
45.45.105.94:443
74.194.4.181:443
98.219.77.197:443
174.20.165.21:995
75.82.228.209:443
72.16.212.107:995
24.229.245.124:995
41.228.241.244:443
104.36.135.227:443
182.56.134.44:995
5.15.108.24:443
5.182.39.156:443
162.244.225.30:443
184.74.101.234:995
74.134.35.54:443
78.38.3.109:995
111.125.70.30:2222
75.130.117.134:443
203.177.67.203:443
173.173.68.41:443
79.114.193.187:443
173.61.231.209:443
190.217.1.149:443
46.153.64.148:995
181.91.252.233:443
67.209.195.198:3389
71.126.139.251:443
76.23.204.29:443
50.247.230.33:995
83.25.192.238:2222
173.175.29.210:443
23.240.185.215:443
98.164.253.75:443
47.136.224.60:443
108.227.161.27:443
68.1.115.106:443
47.202.98.230:443
74.96.151.6:443
72.38.44.119:995
71.80.227.238:443
66.222.88.126:995
206.248.55.181:443
108.39.114.84:443
172.89.210.56:443
45.45.105.94:990
70.164.39.91:443
120.29.124.86:443
174.82.131.155:995
184.88.83.183:443
201.209.52.121:2222
98.148.177.77:443
74.102.83.89:443
66.31.96.223:443
96.244.38.23:443
76.127.42.126:20
47.227.198.155:443
24.202.42.48:2222
108.54.103.234:443
24.201.79.208:2078
72.16.212.107:465
104.191.66.184:443
68.174.15.223:443
35.134.202.234:443
152.208.21.141:995
83.110.251.13:443
72.46.151.196:995
84.241.3.185:443
24.253.91.179:443
65.30.12.240:443
72.29.181.77:2078
47.146.169.85:443
72.218.167.183:443
71.77.231.251:443
73.133.46.105:443
93.114.89.119:443
97.78.107.14:443
24.250.199.137:443
63.155.140.103:995
65.185.84.240:443
184.180.157.203:2222
174.16.230.25:993
47.153.115.154:443
105.186.103.56:443
69.246.151.5:443
117.204.106.63:443
173.172.205.216:443
68.49.120.179:443
80.14.209.42:2222
70.177.25.99:443
72.45.14.185:443
104.35.124.47:2078
77.159.149.74:443
71.172.110.236:443
24.44.180.236:2222
24.110.14.40:443
64.19.74.29:995
71.226.140.73:443
70.62.160.186:6883
157.37.170.58:995
71.187.170.235:443
70.95.94.91:2222
173.22.120.11:2222
72.209.191.27:443
72.231.224.122:2222
72.160.155.16:443
197.100.13.162:995
65.131.79.162:995
173.3.132.17:995
98.11.107.73:443
184.89.71.68:443
206.51.202.106:50002
173.79.220.156:443
172.89.144.89:995
125.99.81.137:443
70.174.3.241:443
76.101.26.55:443
67.250.184.157:443
70.176.164.129:443
71.50.202.154:2222
96.227.138.53:443
79.106.13.119:995
24.99.180.247:443
73.226.220.56:443
162.244.224.166:443
181.126.86.223:443
Signatures
-
Qakbot family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1852 cmd.exe 2260 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2260 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 2248 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 2248 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 2248 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 2248 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3728 wrote to memory of 2248 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 86 PID 3728 wrote to memory of 2248 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 86 PID 3728 wrote to memory of 2248 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 86 PID 3728 wrote to memory of 1852 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 87 PID 3728 wrote to memory of 1852 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 87 PID 3728 wrote to memory of 1852 3728 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 87 PID 1852 wrote to memory of 2260 1852 cmd.exe 89 PID 1852 wrote to memory of 2260 1852 cmd.exe 89 PID 1852 wrote to memory of 2260 1852 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe"C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exeC:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe /C2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2260
-
-