Analysis
-
max time kernel
132s -
max time network
113s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 14:58
Static task
static1
Behavioral task
behavioral1
Sample
44467.702902662.dat.dll
Resource
win7v20210408
General
-
Target
44467.702902662.dat.dll
-
Size
750KB
-
MD5
3adc41a38c53d9798e9be8d135ba47d8
-
SHA1
854b7b23da76f583e6c157e643e1e0e50dd902e4
-
SHA256
cf0c686564c106b2da71b916c7d022e77894c6dd48e5dc8fec000254def55f11
-
SHA512
c9b9302e9ab3fd345b561e856183d15a65b3f042eb168927abc8177538e97bb271cd6bd7bd87411f46671abbc48bafbb997ccdfa4ba4999ce4335059530da581
Malware Config
Extracted
qakbot
402.363
obama105
1632821932
120.151.47.189:443
41.228.22.180:443
39.52.241.3:995
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
196.217.156.63:995
120.150.218.241:995
95.77.223.148:443
185.250.148.74:443
181.118.183.94:443
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
76.25.142.196:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4324 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4184 rundll32.exe 4184 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 4184 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exedescription pid process target process PID 3704 wrote to memory of 4184 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 4184 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 4184 3704 rundll32.exe rundll32.exe PID 4184 wrote to memory of 4160 4184 rundll32.exe explorer.exe PID 4184 wrote to memory of 4160 4184 rundll32.exe explorer.exe PID 4184 wrote to memory of 4160 4184 rundll32.exe explorer.exe PID 4184 wrote to memory of 4160 4184 rundll32.exe explorer.exe PID 4184 wrote to memory of 4160 4184 rundll32.exe explorer.exe PID 4160 wrote to memory of 4316 4160 explorer.exe schtasks.exe PID 4160 wrote to memory of 4316 4160 explorer.exe schtasks.exe PID 4160 wrote to memory of 4316 4160 explorer.exe schtasks.exe PID 4348 wrote to memory of 4324 4348 regsvr32.exe regsvr32.exe PID 4348 wrote to memory of 4324 4348 regsvr32.exe regsvr32.exe PID 4348 wrote to memory of 4324 4348 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44467.702902662.dat.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44467.702902662.dat.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn sedejdtifb /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\44467.702902662.dat.dll\"" /SC ONCE /Z /ST 15:01 /ET 15:134⤵
- Creates scheduled task(s)
PID:4316
-
-
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\44467.702902662.dat.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\44467.702902662.dat.dll"2⤵
- Loads dropped DLL
PID:4324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3adc41a38c53d9798e9be8d135ba47d8
SHA1854b7b23da76f583e6c157e643e1e0e50dd902e4
SHA256cf0c686564c106b2da71b916c7d022e77894c6dd48e5dc8fec000254def55f11
SHA512c9b9302e9ab3fd345b561e856183d15a65b3f042eb168927abc8177538e97bb271cd6bd7bd87411f46671abbc48bafbb997ccdfa4ba4999ce4335059530da581
-
MD5
3adc41a38c53d9798e9be8d135ba47d8
SHA1854b7b23da76f583e6c157e643e1e0e50dd902e4
SHA256cf0c686564c106b2da71b916c7d022e77894c6dd48e5dc8fec000254def55f11
SHA512c9b9302e9ab3fd345b561e856183d15a65b3f042eb168927abc8177538e97bb271cd6bd7bd87411f46671abbc48bafbb997ccdfa4ba4999ce4335059530da581