Analysis
-
max time kernel
85s -
max time network
87s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-09-2021 20:19
Static task
static1
Behavioral task
behavioral1
Sample
3622f351a8f8f92162c87de3a0abeb4ef9b51968fd6fb3ac1b7b73aea10acb48.dll
Resource
win7-en-20210920
General
-
Target
3622f351a8f8f92162c87de3a0abeb4ef9b51968fd6fb3ac1b7b73aea10acb48.dll
-
Size
885KB
-
MD5
979d8fb51f2c6e1c65fec4d0418bc473
-
SHA1
0b210966844c2cd707e2e27d463fcd5698568ac6
-
SHA256
3622f351a8f8f92162c87de3a0abeb4ef9b51968fd6fb3ac1b7b73aea10acb48
-
SHA512
d5d71a70a1e91f4ac8f3a3a936b96a0da4976ad823784fd89c15c4460630d02252b7a493e43abd1356f18d0f9118b486611bac256458ff79f19afa207a622a88
Malware Config
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3984 624 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
rundll32.exeWerFault.exepid process 624 rundll32.exe 624 rundll32.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe 3984 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3984 WerFault.exe Token: SeBackupPrivilege 3984 WerFault.exe Token: SeDebugPrivilege 3984 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 532 wrote to memory of 624 532 rundll32.exe rundll32.exe PID 532 wrote to memory of 624 532 rundll32.exe rundll32.exe PID 532 wrote to memory of 624 532 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3622f351a8f8f92162c87de3a0abeb4ef9b51968fd6fb3ac1b7b73aea10acb48.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3622f351a8f8f92162c87de3a0abeb4ef9b51968fd6fb3ac1b7b73aea10acb48.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 7363⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/624-114-0x0000000000000000-mapping.dmp
-
memory/624-115-0x00000000034D0000-0x00000000034D1000-memory.dmpFilesize
4KB
-
memory/624-116-0x00000000035D0000-0x00000000035F5000-memory.dmpFilesize
148KB
-
memory/624-117-0x00000000053C0000-0x00000000053E1000-memory.dmpFilesize
132KB