Analysis
-
max time kernel
139s -
max time network
118s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 15:46
Static task
static1
Behavioral task
behavioral1
Sample
44467.7730002314.dat.dll
Resource
win7v20210408
General
-
Target
44467.7730002314.dat.dll
-
Size
750KB
-
MD5
e2ea31f06e36a66fe29fdad302410e36
-
SHA1
6e7b7faee6212f233373c559f0e8900f80b7098a
-
SHA256
05bd9cbf9725884979435d684a7268a75eb05d5916dc85325b0286e9ed71a038
-
SHA512
87b3af9ce4f72e6c7d2920654f6dde2ed274674bf6b3e3092ab987aceb29c2d47b9ee512a4c044e64a37ba703eff775c575d5cfddb64986eafd2572cab442f87
Malware Config
Extracted
qakbot
402.363
obama105
1632821932
120.151.47.189:443
41.228.22.180:443
39.52.241.3:995
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
196.217.156.63:995
120.150.218.241:995
95.77.223.148:443
185.250.148.74:443
181.118.183.94:443
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
76.25.142.196:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1108 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\471add44 = 580d12d1c18d77bc3cbd8aadf615ca446262e02eccf54b88bfff64ffb5f300904a27e589d1a7ce949ef24e54 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\82aef5ab = 43974ce80f3bc28e232e685792bf6763ba40123945074500380a7009a8eae0025fc5c29e09907a0d2f876fcddd2eb00ada7716c310c43fe773236f0168177338eb9b575235 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\455bfd38 = f6f08ccb5d20f12a4327cbfd575f67605bda876e5e3aa4bb4e6b91b02fc1bd746bc98dabb8509b5bb57be13434862d3ec742df5575a488a53ae6baf4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\b73125e5 = f6fc27554c83852084e52ba525dae2cc0c247b814d18281fe38f16266f550807536d96af49be1562bbb4f24bd6ae028574445f7039ce9ed9cf35a98d6dd3e3f3bed2543d88ca699e0cd0 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\c8784a13 = effd73dad2f548be211a360909ebaae6bbb8806ed52741508c8232595600b2619a614b2acca17002265204ec6b0b2bdf1133fed4fc68a58fa44cde7fa17efe21a6f8e5f7fd0a1e9a63e90d1949654e6c71ab8f00 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\fde79a5d = 0397b796965dcfbc2f3acc0554f536d896dd8dbb0d23b5dbc20f892e56276774adfbf830348a467dd59c27469b678bd5f67aff25b9deca4240f3153e29c70ca254705ed89f9613b3eb38e5f2b3227903da814c114803718ea37203cafda8f482d2d9a9f18c2cd473291883f7f188f306e84f5e1bc9f756c9613f530634e3c234c480cb820e5467da5bacc56ce7d69065414b0202de explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\ffa6ba21 = 027c72ecd51af0af3383cc7caba58f87a4d0e00f1e23b247b1081ad4c995127b31c53887cf8e6e0dc756b77869c2788382e196e87af2bab3fa explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\3a1292ce = 603c0e2a0a135c4a422ad60c5b5e96dc17b3421d8155d45d484586893dd2b47d8bfd1787c751faadfc002af34e32b5d391f187c6d9f364d73fe04ac2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zadjfjuulax\c8784a13 = effd64dad2f57de255aa814f9abe13cd2e5dbdcca739bf43c9d30b18fb46b02da3747d404785db17dc3e95b741884e42d2ff508b9c64ba7d7f9d6f4065c703ed9b6da1e24fc849d970067ac73ff718f5fe0fb9bce02f9b577a6e63f2368f55d34a52e56748a931e8d4 explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1868 rundll32.exe 1868 rundll32.exe 1108 regsvr32.exe 1108 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1868 rundll32.exe 1108 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1784 wrote to memory of 1868 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1868 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1868 1784 rundll32.exe rundll32.exe PID 1868 wrote to memory of 2516 1868 rundll32.exe explorer.exe PID 1868 wrote to memory of 2516 1868 rundll32.exe explorer.exe PID 1868 wrote to memory of 2516 1868 rundll32.exe explorer.exe PID 1868 wrote to memory of 2516 1868 rundll32.exe explorer.exe PID 1868 wrote to memory of 2516 1868 rundll32.exe explorer.exe PID 2516 wrote to memory of 2676 2516 explorer.exe schtasks.exe PID 2516 wrote to memory of 2676 2516 explorer.exe schtasks.exe PID 2516 wrote to memory of 2676 2516 explorer.exe schtasks.exe PID 304 wrote to memory of 1108 304 regsvr32.exe regsvr32.exe PID 304 wrote to memory of 1108 304 regsvr32.exe regsvr32.exe PID 304 wrote to memory of 1108 304 regsvr32.exe regsvr32.exe PID 1108 wrote to memory of 2524 1108 regsvr32.exe explorer.exe PID 1108 wrote to memory of 2524 1108 regsvr32.exe explorer.exe PID 1108 wrote to memory of 2524 1108 regsvr32.exe explorer.exe PID 1108 wrote to memory of 2524 1108 regsvr32.exe explorer.exe PID 1108 wrote to memory of 2524 1108 regsvr32.exe explorer.exe PID 2524 wrote to memory of 840 2524 explorer.exe reg.exe PID 2524 wrote to memory of 840 2524 explorer.exe reg.exe PID 2524 wrote to memory of 4076 2524 explorer.exe reg.exe PID 2524 wrote to memory of 4076 2524 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44467.7730002314.dat.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44467.7730002314.dat.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn aiartfi /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\44467.7730002314.dat.dll\"" /SC ONCE /Z /ST 15:49 /ET 16:014⤵
- Creates scheduled task(s)
PID:2676
-
-
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\44467.7730002314.dat.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\44467.7730002314.dat.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Kihyudyiduks" /d "0"4⤵PID:840
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Nycullaagy" /d "0"4⤵PID:4076
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e2ea31f06e36a66fe29fdad302410e36
SHA16e7b7faee6212f233373c559f0e8900f80b7098a
SHA25605bd9cbf9725884979435d684a7268a75eb05d5916dc85325b0286e9ed71a038
SHA51287b3af9ce4f72e6c7d2920654f6dde2ed274674bf6b3e3092ab987aceb29c2d47b9ee512a4c044e64a37ba703eff775c575d5cfddb64986eafd2572cab442f87
-
MD5
e2ea31f06e36a66fe29fdad302410e36
SHA16e7b7faee6212f233373c559f0e8900f80b7098a
SHA25605bd9cbf9725884979435d684a7268a75eb05d5916dc85325b0286e9ed71a038
SHA51287b3af9ce4f72e6c7d2920654f6dde2ed274674bf6b3e3092ab987aceb29c2d47b9ee512a4c044e64a37ba703eff775c575d5cfddb64986eafd2572cab442f87