Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 21:41
Static task
static1
Behavioral task
behavioral1
Sample
375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe
Resource
win7-20241010-en
General
-
Target
375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe
-
Size
388KB
-
MD5
8ba64166174589397392dfb389a6471a
-
SHA1
d3f2fffc6c9bb244bc6de6748103ec09f9645759
-
SHA256
375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c
-
SHA512
f3d2044c55ec41dd771c3b032734855f3a8c82f70e6ceb651e85a1e0544fd298dae025305ffbae604129d23049c480e83dad5212b7ccbd933758a38f6cc555c2
-
SSDEEP
6144:XjiJi6LQKqQ0O1K9QxeSSAN8BVHV2CIe997bOj3b:XX64QrK9QxeSSAN6VHYCOrb
Malware Config
Extracted
qakbot
324.8
1582189741
Protocol: ftp- Host:
192.185.5.208 - Port:
21 - Username:
[email protected] - Password:
NxdkxAp4dUsY
Protocol: ftp- Host:
162.241.218.118 - Port:
21 - Username:
[email protected] - Password:
EcOV0DyGVgVN
Protocol: ftp- Host:
69.89.31.139 - Port:
21 - Username:
[email protected] - Password:
fcR7OvyLrMW6!
Protocol: ftp- Host:
169.207.67.14 - Port:
21 - Username:
[email protected] - Password:
eQyicNLzzqPN
206.169.163.147:995
98.213.28.175:443
175.111.128.234:443
50.78.93.74:443
99.199.174.72:443
37.26.26.43:443
172.78.87.180:443
96.35.170.82:2222
100.40.48.96:443
47.153.115.154:995
104.3.91.20:995
69.92.54.95:995
24.32.119.146:443
71.88.220.181:443
78.56.103.184:443
86.254.93.195:2222
75.110.250.89:443
75.81.25.223:995
86.126.253.30:443
104.34.122.18:443
174.34.67.106:2222
47.216.36.60:443
184.191.62.24:995
217.162.149.212:443
45.45.105.94:443
74.194.4.181:443
98.219.77.197:443
174.20.165.21:995
75.82.228.209:443
72.16.212.107:995
24.229.245.124:995
41.228.241.244:443
104.36.135.227:443
182.56.134.44:995
5.15.108.24:443
5.182.39.156:443
162.244.225.30:443
184.74.101.234:995
74.134.35.54:443
78.38.3.109:995
111.125.70.30:2222
75.130.117.134:443
203.177.67.203:443
173.173.68.41:443
79.114.193.187:443
173.61.231.209:443
190.217.1.149:443
46.153.64.148:995
181.91.252.233:443
67.209.195.198:3389
71.126.139.251:443
76.23.204.29:443
50.247.230.33:995
83.25.192.238:2222
173.175.29.210:443
23.240.185.215:443
98.164.253.75:443
47.136.224.60:443
108.227.161.27:443
68.1.115.106:443
47.202.98.230:443
74.96.151.6:443
72.38.44.119:995
71.80.227.238:443
66.222.88.126:995
206.248.55.181:443
108.39.114.84:443
172.89.210.56:443
45.45.105.94:990
70.164.39.91:443
120.29.124.86:443
174.82.131.155:995
184.88.83.183:443
201.209.52.121:2222
98.148.177.77:443
74.102.83.89:443
66.31.96.223:443
96.244.38.23:443
76.127.42.126:20
47.227.198.155:443
24.202.42.48:2222
108.54.103.234:443
24.201.79.208:2078
72.16.212.107:465
104.191.66.184:443
68.174.15.223:443
35.134.202.234:443
152.208.21.141:995
83.110.251.13:443
72.46.151.196:995
84.241.3.185:443
24.253.91.179:443
65.30.12.240:443
72.29.181.77:2078
47.146.169.85:443
72.218.167.183:443
71.77.231.251:443
73.133.46.105:443
93.114.89.119:443
97.78.107.14:443
24.250.199.137:443
63.155.140.103:995
65.185.84.240:443
184.180.157.203:2222
174.16.230.25:993
47.153.115.154:443
105.186.103.56:443
69.246.151.5:443
117.204.106.63:443
173.172.205.216:443
68.49.120.179:443
80.14.209.42:2222
70.177.25.99:443
72.45.14.185:443
104.35.124.47:2078
77.159.149.74:443
71.172.110.236:443
24.44.180.236:2222
24.110.14.40:443
64.19.74.29:995
71.226.140.73:443
70.62.160.186:6883
157.37.170.58:995
71.187.170.235:443
70.95.94.91:2222
173.22.120.11:2222
72.209.191.27:443
72.231.224.122:2222
72.160.155.16:443
197.100.13.162:995
65.131.79.162:995
173.3.132.17:995
98.11.107.73:443
184.89.71.68:443
206.51.202.106:50002
173.79.220.156:443
172.89.144.89:995
125.99.81.137:443
70.174.3.241:443
76.101.26.55:443
67.250.184.157:443
70.176.164.129:443
71.50.202.154:2222
96.227.138.53:443
79.106.13.119:995
24.99.180.247:443
73.226.220.56:443
162.244.224.166:443
181.126.86.223:443
Signatures
-
Qakbot family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1028 cmd.exe 2724 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 2288 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 2288 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2288 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 31 PID 2564 wrote to memory of 2288 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 31 PID 2564 wrote to memory of 2288 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 31 PID 2564 wrote to memory of 2288 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 31 PID 2564 wrote to memory of 1028 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 32 PID 2564 wrote to memory of 1028 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 32 PID 2564 wrote to memory of 1028 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 32 PID 2564 wrote to memory of 1028 2564 375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe 32 PID 1028 wrote to memory of 2724 1028 cmd.exe 34 PID 1028 wrote to memory of 2724 1028 cmd.exe 34 PID 1028 wrote to memory of 2724 1028 cmd.exe 34 PID 1028 wrote to memory of 2724 1028 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe"C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exeC:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe /C2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\375cc112d9052de805951af453e483b0372f2797a09108d3c9feab4015b45e4c.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2724
-
-