Analysis
-
max time kernel
144s -
max time network
73s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-10-2021 13:29
Static task
static1
Behavioral task
behavioral1
Sample
repo.html.2.dll
Resource
win7-en-20210920
General
-
Target
repo.html.2.dll
-
Size
484KB
-
MD5
6efb8dc48e232aa7ba405632259af67a
-
SHA1
2a1c0f25a9768fa04c648567e6d533f789793bb4
-
SHA256
6ac1f7b75783b42e112828cb97ddea479b82e20ab82df792a1da5b41473c6e40
-
SHA512
4e7b0013506df2437ecb801d268faf876255a4d66b88dad9f7d85c031d8a963e25c6360e8d6c1d0d48ba84e6dc4500e3ba8246bb2e013b5df0bda9b4312a7ee2
Malware Config
Extracted
qakbot
402.363
tr
1632817399
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
120.151.47.189:443
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
76.25.142.196:443
181.118.183.94:443
120.150.218.241:995
185.250.148.74:443
95.77.223.148:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
105.157.55.133:995
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1460 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\c4ece5bf = 6c3277f982464dae8b50893a27aebc10a70437096e060a56f04ca8ef608122649fddfeb576d7a134bc275f395449c329c70c4460531611867ca15e61edb7275c62a878ecd6692f1c1748c3d835d9c10600b8e52c18facd3c379d8e5713c9f69942e5201be12bb218 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\319ed2c = 7e49031860885e0e8e67309eccc522b69ba9c46d8b99b2c63c84030f3252ea904d72e5529cc5e1b349712ee5832a00f22242c803fba017c45f1d34e969b037ff8b233d03cdd6d3d5920c86980c1ca5baba7ab6b0539d61e837 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\f17335f1 = 75cfbb96ae509aad737f179c1c4cff56a84b089c396c89f867214cae5f232be3fd65909dacf12ac2b0cb183c64eb1148c47c91881b03b23663a16f7ac8f342c1a2e0166cf3524f874f9f49632e80c3d7aec63467f6e5926f74d5848c48c212f81bc1c17c0959fd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\8e3a5a07 = 48a59765fbbff1a328eeaaf23e8631191a76dec7ada07cccce1722ac0ac25dbbe3a30aa17ac2f530b10bdc5792d4a4d3cf56d618c68e14d72d03cdad1f2e26aac68559904f9018f5b07614f476ef97c6ec1696ffe5e54d8bde6d979273b9474815c9a34032518c07e90db4bc0b325c7f0c05cfe0e986dcc7c4bc67d8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\158cd50 = 9464e2432ffc984e6cd97f4e526aa6183bad5394ae7e07fd98223cdade7947036d85cc9bb274c23842ea48fa070621558729b38a96988817862124575c77655c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\7c5082da = 5cf8151b111af6b5bc92ba08152c86cf2a48689d15550056ce2abdf3f8acdeb1c136186138b73906dabbd65f7040934f8c97d764313afef5b6503a92c057 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\8e3a5a07 = 48a58065fbbfc48babfaba912e80ce1a7a41cc89a4a3008050ad31720d47269de4c34e1017e11e66f583b74fbc46628c16e33ea8a4ec7bd7e9ab2b4f0e868b0eb2368ddad744fc300068de37a08f169ac1bb194f74f9bca1cea107f9712c17b678ad9fc005eea7 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\bba58a49 = 2ff9eccfb8462adc2ec53c3ba6de4b1a780a25fdd437cd7ffc84cf86edf0d69582974e5ee679fa80099ecc6f614e90ea109963bc4a3fff88f9edc6f443e259a46079ebc419ba4c6a2b1a1799b3172da2b54068100ac9e13d0ae9b79cb08d54097e6d3fa60b0571d65fa59c9fe77a8bf2e8f003360ed6b4c622c5dabed5c0b9140844c8e6e0aea00f89e8a7a80724340769ff6612555f9dbaaee170e8ef518288de788908080ef9da48 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yiaabaxins\b9e4aa35 = 6ebd7aca541a6c15a8a44f11382f877dde776fecfb3fbfd60af1e12d71a13465c65a2e10b6620dd036ee8bc037e06301a0b4ee5608419c5fbe0ca7bb103fe1f0b3b10604e5d885cbf7dce76523d354c09e41 explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid process 836 rundll32.exe 836 rundll32.exe 1460 regsvr32.exe 1460 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 836 rundll32.exe 1460 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 664 wrote to memory of 836 664 rundll32.exe rundll32.exe PID 664 wrote to memory of 836 664 rundll32.exe rundll32.exe PID 664 wrote to memory of 836 664 rundll32.exe rundll32.exe PID 836 wrote to memory of 2528 836 rundll32.exe explorer.exe PID 836 wrote to memory of 2528 836 rundll32.exe explorer.exe PID 836 wrote to memory of 2528 836 rundll32.exe explorer.exe PID 836 wrote to memory of 2528 836 rundll32.exe explorer.exe PID 836 wrote to memory of 2528 836 rundll32.exe explorer.exe PID 2528 wrote to memory of 3528 2528 explorer.exe schtasks.exe PID 2528 wrote to memory of 3528 2528 explorer.exe schtasks.exe PID 2528 wrote to memory of 3528 2528 explorer.exe schtasks.exe PID 1020 wrote to memory of 1460 1020 regsvr32.exe regsvr32.exe PID 1020 wrote to memory of 1460 1020 regsvr32.exe regsvr32.exe PID 1020 wrote to memory of 1460 1020 regsvr32.exe regsvr32.exe PID 1460 wrote to memory of 2696 1460 regsvr32.exe explorer.exe PID 1460 wrote to memory of 2696 1460 regsvr32.exe explorer.exe PID 1460 wrote to memory of 2696 1460 regsvr32.exe explorer.exe PID 1460 wrote to memory of 2696 1460 regsvr32.exe explorer.exe PID 1460 wrote to memory of 2696 1460 regsvr32.exe explorer.exe PID 2696 wrote to memory of 3344 2696 explorer.exe reg.exe PID 2696 wrote to memory of 3344 2696 explorer.exe reg.exe PID 2696 wrote to memory of 2164 2696 explorer.exe reg.exe PID 2696 wrote to memory of 2164 2696 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\repo.html.2.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\repo.html.2.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn gsaplnslsp /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\repo.html.2.dll\"" /SC ONCE /Z /ST 15:31 /ET 15:434⤵
- Creates scheduled task(s)
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\repo.html.2.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\repo.html.2.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Kpuxnsh" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Gndoy" /d "0"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\repo.html.2.dllMD5
6efb8dc48e232aa7ba405632259af67a
SHA12a1c0f25a9768fa04c648567e6d533f789793bb4
SHA2566ac1f7b75783b42e112828cb97ddea479b82e20ab82df792a1da5b41473c6e40
SHA5124e7b0013506df2437ecb801d268faf876255a4d66b88dad9f7d85c031d8a963e25c6360e8d6c1d0d48ba84e6dc4500e3ba8246bb2e013b5df0bda9b4312a7ee2
-
\Users\Admin\AppData\Local\Temp\repo.html.2.dllMD5
6efb8dc48e232aa7ba405632259af67a
SHA12a1c0f25a9768fa04c648567e6d533f789793bb4
SHA2566ac1f7b75783b42e112828cb97ddea479b82e20ab82df792a1da5b41473c6e40
SHA5124e7b0013506df2437ecb801d268faf876255a4d66b88dad9f7d85c031d8a963e25c6360e8d6c1d0d48ba84e6dc4500e3ba8246bb2e013b5df0bda9b4312a7ee2
-
memory/836-116-0x0000000010000000-0x0000000010085000-memory.dmpFilesize
532KB
-
memory/836-115-0x0000000010000000-0x0000000010021000-memory.dmpFilesize
132KB
-
memory/836-117-0x0000000000AF0000-0x0000000000AF1000-memory.dmpFilesize
4KB
-
memory/836-114-0x0000000000000000-mapping.dmp
-
memory/1460-128-0x00000000039E0000-0x0000000003BEE000-memory.dmpFilesize
2.1MB
-
memory/1460-124-0x0000000000000000-mapping.dmp
-
memory/1460-127-0x0000000010000000-0x0000000010085000-memory.dmpFilesize
532KB
-
memory/2164-131-0x0000000000000000-mapping.dmp
-
memory/2528-122-0x00000000035D0000-0x00000000035D1000-memory.dmpFilesize
4KB
-
memory/2528-119-0x0000000003200000-0x0000000003221000-memory.dmpFilesize
132KB
-
memory/2528-118-0x0000000000000000-mapping.dmp
-
memory/2696-129-0x0000000000000000-mapping.dmp
-
memory/2696-134-0x00000000009A0000-0x00000000009C1000-memory.dmpFilesize
132KB
-
memory/3344-130-0x0000000000000000-mapping.dmp
-
memory/3528-120-0x0000000000000000-mapping.dmp