Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-09-2021 14:34
Static task
static1
Behavioral task
behavioral1
Sample
44351.7355255787.dat.dll
Resource
win7-en-20210920
General
-
Target
44351.7355255787.dat.dll
-
Size
378KB
-
MD5
f84f4afdf87d8ca3e8b72f8283514143
-
SHA1
e8851df38788d0c3e24f6a414b05e15de57fabff
-
SHA256
52f818ae518c008f0139fe006ba139239db225d8d67816274d9ad3efb4bc81ca
-
SHA512
a3ca3b3c198e0582cca739f72f1e01f5bcd643fb268c1b529315e430e8f440296c7cd7bcac427b470510e84262715b44f81b0ce31e703a362eb6083576cf2618
Malware Config
Extracted
qakbot
402.343
obama104
1632729661
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2420 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\cbbdd33e = 70fb5506a1ba9121f78a667012f1c91522e637690ce931ff22c3ebf7e4a713d0538207bdf2825311651159e42f1dfff9614935dbccc9359be31250a7c2b218 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\39d70be3 = 4df4a3f1ec431f43f7dc791cecc3fe54672ccaa77615d87dca8bbb9dcbd23a187fde99d4e3f72a3c825ab1f89c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\469e6415 = edad39aa1cbfd2f0eb80de65c2f6ba65811ff4e527da99378e78ba5bbbc737d3eb0c05446385670ef5776cd714671a04c683e52df4c71e03f38ce376ee69599c1b64c1fe34416d55e34129c5874f10f6a7e1420d8b433da2e6298eee explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\fe220370 = b99a1310f188814d5d9c597e777ec610351a2f1a5917fc7f91e8cb21428c0d02c8e2f63da454a3edf24843a30a0b8d05456984b78470d032bc43a70451e14db275020d827d6f6498d2d457a3dd126d5e6bdf31162c62f0851995cd0abf98085a6d92b292b5eb0061ba0848f78e3ba50172d00d9bceaca6265c613ae8ff809579c056d1babefa285adbb9f8e5cf418cf72f64832be3949fff99a3dd40ccdd8065765a675509 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\fc63230c = 42b241cf85aefb875f89df040b84ea89f97456be9fcaf711e8b71da6b556e690a5c75584043a06cf214f3d1ee8dc7f9d19e3ee8054c64d800263ad1b34d2a20fffb04b5660bcaae2e2a0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\44df4469 = 8dd5e3e03fb13a495ab8a4a9f39b92b93d79f2604eab234e3837a9a7443edfeb6468417ca58ef29138e676f5f34022e2f0e3ee68321aaa49119f6a6159b3159d8ea5f51c2fdc86481f41e8045194d61f5b87e6b7438ff8efd942283c04c2437e90 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\816b6c86 = 3ff33060e0ae3105d1fabf4464a2a3ea3bf9ccc12acf137f33f81dc50c8152ed21f8d2888d61ca2e252b5113805083dcb1873e2c2002acf91d9cf2bb30f0ee36d64901608472e689ebecc80f7c206236307b575bd295aaca68b25dbbcb80a12696 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\b4f4bcc8 = 7e8185bb028b0596327d9ebfea340f07bec66c40514393037b677ff3e9e83ca0b0128186bdbd5a9f86c7b247995c130217e122c09623 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xkwuqxft\cbbdd33e = 70fb4206a1baa4ae10c47535e130b07cf02ba3eaf605947973ea04248eaf22218f83155f01a7c682cabd32536414dff00071c10b98b9c1b4da72dfd942087b50d46a847617628237f75008ef20800b7f437b3d5e explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid process 908 rundll32.exe 908 rundll32.exe 2420 regsvr32.exe 2420 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 908 rundll32.exe 2420 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 644 wrote to memory of 908 644 rundll32.exe rundll32.exe PID 644 wrote to memory of 908 644 rundll32.exe rundll32.exe PID 644 wrote to memory of 908 644 rundll32.exe rundll32.exe PID 908 wrote to memory of 476 908 rundll32.exe explorer.exe PID 908 wrote to memory of 476 908 rundll32.exe explorer.exe PID 908 wrote to memory of 476 908 rundll32.exe explorer.exe PID 908 wrote to memory of 476 908 rundll32.exe explorer.exe PID 908 wrote to memory of 476 908 rundll32.exe explorer.exe PID 476 wrote to memory of 1084 476 explorer.exe schtasks.exe PID 476 wrote to memory of 1084 476 explorer.exe schtasks.exe PID 476 wrote to memory of 1084 476 explorer.exe schtasks.exe PID 1544 wrote to memory of 2420 1544 regsvr32.exe regsvr32.exe PID 1544 wrote to memory of 2420 1544 regsvr32.exe regsvr32.exe PID 1544 wrote to memory of 2420 1544 regsvr32.exe regsvr32.exe PID 2420 wrote to memory of 3744 2420 regsvr32.exe explorer.exe PID 2420 wrote to memory of 3744 2420 regsvr32.exe explorer.exe PID 2420 wrote to memory of 3744 2420 regsvr32.exe explorer.exe PID 2420 wrote to memory of 3744 2420 regsvr32.exe explorer.exe PID 2420 wrote to memory of 3744 2420 regsvr32.exe explorer.exe PID 3744 wrote to memory of 3960 3744 explorer.exe reg.exe PID 3744 wrote to memory of 3960 3744 explorer.exe reg.exe PID 3744 wrote to memory of 3100 3744 explorer.exe reg.exe PID 3744 wrote to memory of 3100 3744 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44351.7355255787.dat.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44351.7355255787.dat.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn knvhpkimn /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\44351.7355255787.dat.dll\"" /SC ONCE /Z /ST 16:36 /ET 16:484⤵
- Creates scheduled task(s)
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\44351.7355255787.dat.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\44351.7355255787.dat.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Hjheu" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Psxpy" /d "0"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\44351.7355255787.dat.dllMD5
f84f4afdf87d8ca3e8b72f8283514143
SHA1e8851df38788d0c3e24f6a414b05e15de57fabff
SHA25652f818ae518c008f0139fe006ba139239db225d8d67816274d9ad3efb4bc81ca
SHA512a3ca3b3c198e0582cca739f72f1e01f5bcd643fb268c1b529315e430e8f440296c7cd7bcac427b470510e84262715b44f81b0ce31e703a362eb6083576cf2618
-
\Users\Admin\AppData\Local\Temp\44351.7355255787.dat.dllMD5
f84f4afdf87d8ca3e8b72f8283514143
SHA1e8851df38788d0c3e24f6a414b05e15de57fabff
SHA25652f818ae518c008f0139fe006ba139239db225d8d67816274d9ad3efb4bc81ca
SHA512a3ca3b3c198e0582cca739f72f1e01f5bcd643fb268c1b529315e430e8f440296c7cd7bcac427b470510e84262715b44f81b0ce31e703a362eb6083576cf2618
-
memory/476-117-0x0000000000000000-mapping.dmp
-
memory/476-121-0x0000000002900000-0x0000000002921000-memory.dmpFilesize
132KB
-
memory/908-114-0x0000000000000000-mapping.dmp
-
memory/908-116-0x0000000010000000-0x0000000010062000-memory.dmpFilesize
392KB
-
memory/908-115-0x0000000004DE0000-0x0000000004E6E000-memory.dmpFilesize
568KB
-
memory/1084-118-0x0000000000000000-mapping.dmp
-
memory/2420-123-0x0000000000000000-mapping.dmp
-
memory/2420-125-0x0000000003560000-0x00000000035A2000-memory.dmpFilesize
264KB
-
memory/3100-128-0x0000000000000000-mapping.dmp
-
memory/3744-126-0x0000000000000000-mapping.dmp
-
memory/3744-131-0x00000000028B0000-0x00000000028D1000-memory.dmpFilesize
132KB
-
memory/3960-127-0x0000000000000000-mapping.dmp