Analysis
-
max time kernel
151s -
max time network
111s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
01-10-2021 15:17
Static task
static1
Behavioral task
behavioral1
Sample
test2.test.dll
Resource
win7v20210408
General
-
Target
test2.test.dll
-
Size
662KB
-
MD5
e118e7243284e30f351ef5d971990196
-
SHA1
0d707a965e2e88b69fa5c920d3205f1b2e759718
-
SHA256
1f66f20ac68d80ccdc30210ed8e8abb191aa5bfe4f65e58d3fca2eab8aaa5d49
-
SHA512
89999c787c05faeafc349bdfbc012567b833020b9e10cdfc2f234f860a89d0e0c0b2c672e405164ed7c01d3e8b66cd3c9b67a1580d924504c7bcd5c85fc9502e
Malware Config
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1536 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 19 IoCs
Processes:
explorer.exeregsvr32.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\94dc924b = 882cabf886a4dbaf72db2a8f180a38e21b2510c510c118c97fbf8826b94af10ef70ddd8f911aca6d00071012c3b9eeceb0dd3027468f764c040942d239a1e1a918acd30622f7d0a837f5badb887394e6b41504c663cbe583afdbd4630258443a6a787bf3a40396df214200a6d706b31d596d48fe31f9aaa4b7eac4119a3b629af8522f8726a4b89499da2a03 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm regsvr32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\a1434205 = f7b21a8fcfd95eac03e26b0af3674dcb9dc640d604ee01528378d4933afe2ca177af444f9db8f8540e17aaac6c3dfc988e16c565a74bad278e5ac6c44efe583b4e825612424b877ca23cfe8d0f228f6da8104fc0a14513d848cca025f25882258f10c4d1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\969db237 = 2bcbf588072442ba1bca03f975d03d72e39733ace4a2a2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\eb95fdbd = 4ded478c9212bea8f813ee3b9cd46190a1eda68638c959c1a11f050fafba3da77cf740e9277061f031198699db750d1555a6b190a1c14ef9747e290b434d8b49a91121f058d8e5a142c3a1c08edb3150830b8ddfec2078d056edd8f3751625df4c374082b4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\de0a2df3 = 323ab99741aa0fab8cd53359a8532df7f8a0c968be4c513e457c7e71d7591a24b3bc4deaaa9469b510532a6c400c0ff1a137d3b76d75cc4fd5060aaa3106e4c4da5b017aed67d2 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rtphfoyzwfh explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\2e21d552 = eb1270b04c4494595068e64748ced8fe1937f34393a87c051395b5f247efbcf545a145d035bb61787ce94cad497ef5905b6ff0ed00ae345a169f4ea0963b1a46c76890e8b4134ed151c9148167e1b43318c2e1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\53299ad8 = c493042a02595876fbc0bc0c47c22394fe2ce9fd89bc5296fc907ea6bc85acd1489f3bc9b2ee463ee1d94c explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" regsvr32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\2c60f52e = 1b25ef593a24a59bd3d7977edf5730f6b23bf08ae4b4abd8cc30bbd3491d7e39bc6349d39c09c327a23923d4321eedd6f580b3a06d4a9e79521d421e2ddaeef168d85cc5261696becaa7c8d7a671a3c04c5dff68c3215d6fa155d441470512237e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Rtphfoyzwfh\a1434205 = f7b20d8fcfd96b78e72d0f33f4c737c3c1b40a384c1d725021a9e868d3c6338149b98c9a6e632871980ade702452211f89cc7982a60afda511e46ea441f25224bd0a46eb71c0ccc2d4cbf502ee15582576a4937108a7d753600e3e9b829e0218c9d1b952f8e57e3f57150d910da2a0e4eec657cb5e92f06f14 explorer.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\System regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties regsvr32.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1852 regsvr32.exe 1536 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1852 regsvr32.exe 1536 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1028 wrote to memory of 1852 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1852 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1852 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1852 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1852 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1852 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1852 1028 regsvr32.exe regsvr32.exe PID 1852 wrote to memory of 1840 1852 regsvr32.exe explorer.exe PID 1852 wrote to memory of 1840 1852 regsvr32.exe explorer.exe PID 1852 wrote to memory of 1840 1852 regsvr32.exe explorer.exe PID 1852 wrote to memory of 1840 1852 regsvr32.exe explorer.exe PID 1852 wrote to memory of 1840 1852 regsvr32.exe explorer.exe PID 1852 wrote to memory of 1840 1852 regsvr32.exe explorer.exe PID 1840 wrote to memory of 1528 1840 explorer.exe schtasks.exe PID 1840 wrote to memory of 1528 1840 explorer.exe schtasks.exe PID 1840 wrote to memory of 1528 1840 explorer.exe schtasks.exe PID 1840 wrote to memory of 1528 1840 explorer.exe schtasks.exe PID 1452 wrote to memory of 1620 1452 taskeng.exe regsvr32.exe PID 1452 wrote to memory of 1620 1452 taskeng.exe regsvr32.exe PID 1452 wrote to memory of 1620 1452 taskeng.exe regsvr32.exe PID 1452 wrote to memory of 1620 1452 taskeng.exe regsvr32.exe PID 1452 wrote to memory of 1620 1452 taskeng.exe regsvr32.exe PID 1620 wrote to memory of 1536 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1536 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1536 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1536 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1536 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1536 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1536 1620 regsvr32.exe regsvr32.exe PID 1536 wrote to memory of 456 1536 regsvr32.exe explorer.exe PID 1536 wrote to memory of 456 1536 regsvr32.exe explorer.exe PID 1536 wrote to memory of 456 1536 regsvr32.exe explorer.exe PID 1536 wrote to memory of 456 1536 regsvr32.exe explorer.exe PID 1536 wrote to memory of 456 1536 regsvr32.exe explorer.exe PID 1536 wrote to memory of 456 1536 regsvr32.exe explorer.exe PID 456 wrote to memory of 564 456 explorer.exe reg.exe PID 456 wrote to memory of 564 456 explorer.exe reg.exe PID 456 wrote to memory of 564 456 explorer.exe reg.exe PID 456 wrote to memory of 564 456 explorer.exe reg.exe PID 456 wrote to memory of 664 456 explorer.exe reg.exe PID 456 wrote to memory of 664 456 explorer.exe reg.exe PID 456 wrote to memory of 664 456 explorer.exe reg.exe PID 456 wrote to memory of 664 456 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\test2.test.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\test2.test.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn lcyhduwl /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\test2.test.dll\"" /SC ONCE /Z /ST 17:19 /ET 17:314⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {5EA8BB09-A084-4099-B17B-E0164F542345} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\test2.test.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\test2.test.dll"3⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ilzacusygk" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Piogkevfv" /d "0"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\test2.test.dllMD5
e118e7243284e30f351ef5d971990196
SHA10d707a965e2e88b69fa5c920d3205f1b2e759718
SHA2561f66f20ac68d80ccdc30210ed8e8abb191aa5bfe4f65e58d3fca2eab8aaa5d49
SHA51289999c787c05faeafc349bdfbc012567b833020b9e10cdfc2f234f860a89d0e0c0b2c672e405164ed7c01d3e8b66cd3c9b67a1580d924504c7bcd5c85fc9502e
-
\Users\Admin\AppData\Local\Temp\test2.test.dllMD5
e118e7243284e30f351ef5d971990196
SHA10d707a965e2e88b69fa5c920d3205f1b2e759718
SHA2561f66f20ac68d80ccdc30210ed8e8abb191aa5bfe4f65e58d3fca2eab8aaa5d49
SHA51289999c787c05faeafc349bdfbc012567b833020b9e10cdfc2f234f860a89d0e0c0b2c672e405164ed7c01d3e8b66cd3c9b67a1580d924504c7bcd5c85fc9502e
-
memory/456-81-0x0000000000120000-0x0000000000141000-memory.dmpFilesize
132KB
-
memory/456-76-0x0000000000000000-mapping.dmp
-
memory/564-79-0x0000000000000000-mapping.dmp
-
memory/664-80-0x0000000000000000-mapping.dmp
-
memory/1028-60-0x000007FEFBD61000-0x000007FEFBD63000-memory.dmpFilesize
8KB
-
memory/1528-68-0x0000000000000000-mapping.dmp
-
memory/1536-73-0x0000000000000000-mapping.dmp
-
memory/1620-70-0x0000000000000000-mapping.dmp
-
memory/1840-69-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1840-67-0x00000000744B1000-0x00000000744B3000-memory.dmpFilesize
8KB
-
memory/1840-65-0x0000000000000000-mapping.dmp
-
memory/1852-64-0x0000000010000000-0x0000000010175000-memory.dmpFilesize
1.5MB
-
memory/1852-63-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1852-62-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/1852-61-0x0000000000000000-mapping.dmp