Analysis
-
max time kernel
148s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10-10-2021 06:42
Static task
static1
Behavioral task
behavioral1
Sample
another_dll.dll
Resource
win7-en-20210920
General
-
Target
another_dll.dll
-
Size
263KB
-
MD5
660a42ba7aa190de6de83e577e691b41
-
SHA1
987d0ea16d3ee9f434be471020ad301bde6853e6
-
SHA256
1c61d76eea89db878348b2de168304396cbe5d404f503a423ed05ae7e7598354
-
SHA512
cedf73578bf9d4e91f5d1b9dd1da2c1cfebdf8b468106821996cf61326079096e8373d0085b35cc1668d09e27d8f44d1994ff61b51bbd8e304f4d07305452f86
Malware Config
Extracted
qakbot
402.363
obama107
1633078880
140.82.49.12:443
41.250.143.109:995
216.201.162.158:443
86.8.177.143:443
105.198.236.99:443
124.123.42.115:2222
217.17.56.163:443
37.210.152.224:995
190.198.206.189:2222
75.89.195.186:995
78.191.44.76:995
122.11.220.212:2222
68.186.192.69:443
159.2.51.200:2222
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
120.151.47.189:443
47.22.148.6:443
94.200.181.154:443
81.241.252.59:2078
76.25.142.196:443
89.101.97.139:443
217.17.56.163:0
185.250.148.74:443
174.54.58.170:443
73.130.180.25:443
73.52.50.32:443
174.59.35.191:443
181.118.183.94:443
120.150.218.241:995
73.230.205.91:443
174.54.193.186:443
136.232.34.70:443
71.74.12.34:443
95.77.223.148:443
103.148.120.144:443
75.188.35.168:443
39.52.213.1:995
45.46.53.140:2222
73.151.236.31:443
173.21.10.71:2222
24.34.58.116:443
62.23.194.38:443
62.23.194.41:995
47.40.196.233:2222
67.165.206.193:993
72.252.201.69:443
173.25.166.81:443
199.27.127.129:443
68.204.7.158:443
191.191.38.8:443
109.12.111.14:443
24.139.72.117:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
81.250.153.227:2222
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
103.157.122.198:995
217.165.163.21:995
77.57.204.78:443
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
75.66.88.33:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
2.178.116.91:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2116 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\cae71574 = cb989cea0cccfbeeb42366d0fbeb8530f3926b58f3fce3b2e06f92d0de48e5b9ff3a6be2a344d4c21be6b9793d59f0f81c8e5ceddeeb3f9be9a04d6d9aec12228f40f37b44ffbe287310520ff8e507358f92d227ace148218eb77e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\b5ae7a82 = 3dbe1968fb32bb4a1ed5b22ee45ec2f32d98d127f2d1c888058bf45d5b01eec2e19d234a1a35d963d9b754cefdb1a1ace68bc7dc02af7cf2ccf9fe81b596b294ba21c6a0ffd693af05f1eb54aac9785ec34353f60e4f7385ac6658e55f2cba38dd7d00110cff52d3bb5dddba78c3afdc16e9a938c531 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\f533d9b = 8a260a224736912bafd407338d594390e46995aa4af0303fbebc5e8ec68e01c2142f8293945d6e051ca8193087b6b14a957b8fd3b00e68db989282 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\d121de7 = b182800d6246035d8cfaebacbb6019fe1c2994b5e98ffb89b8084e65a063c1753aa68504751176520b69f4d24768b23e329940b6712cc86c4e65fc8f09f22386cc37ccc6fca14c3eebcc571b26af3f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\ff78c53a = d4efb98ade8bcca69a88491b7e9b321c57507ceb03b08677c634d969223ec25bcfb0778f3594dfb5824bfa7ae7591dfb79b379b92a201f26fc3850bb685d6e768fde200b37362c2535557d5c3779aff0bdfad25108af782de8dfaf3e7f3a59c4e67a6a7a4b3e98cae5ce8bd2f0cb0f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\8031aacc = ade7fafafecea40ab2cde1d3f952cd2fdc97a645d850e4f3e36b55def8252c13c884a618b99be90714 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\8031aacc = ade7edfafece9181138a0506569c31c8ad39282f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\b7ef5afe = fc49b082df9e9fc8597236f46fb2f7b131c989b536824d610ed8900d6042d7c55cc5007ff5c35af54bb2b379337e2a638cf525 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Uiykctf\725b7211 = df4d9100fcdefa2351a29f4372943c08968ff57232ab04f870b3bd428e74ebacb1c16798ae444f3771ebb1613c4400d12278a04644923f2ad9afc5ff9ef94b7260f507e5980a0e97d4d4078eb4e092d10efae4e9791733bbf9e0bcb61be26c6bf8962398 explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2824 regsvr32.exe 2824 regsvr32.exe 2116 regsvr32.exe 2116 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2824 regsvr32.exe 2116 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 904 wrote to memory of 2824 904 regsvr32.exe regsvr32.exe PID 904 wrote to memory of 2824 904 regsvr32.exe regsvr32.exe PID 904 wrote to memory of 2824 904 regsvr32.exe regsvr32.exe PID 2824 wrote to memory of 3004 2824 regsvr32.exe explorer.exe PID 2824 wrote to memory of 3004 2824 regsvr32.exe explorer.exe PID 2824 wrote to memory of 3004 2824 regsvr32.exe explorer.exe PID 2824 wrote to memory of 3004 2824 regsvr32.exe explorer.exe PID 2824 wrote to memory of 3004 2824 regsvr32.exe explorer.exe PID 3004 wrote to memory of 416 3004 explorer.exe schtasks.exe PID 3004 wrote to memory of 416 3004 explorer.exe schtasks.exe PID 3004 wrote to memory of 416 3004 explorer.exe schtasks.exe PID 2056 wrote to memory of 2116 2056 regsvr32.exe regsvr32.exe PID 2056 wrote to memory of 2116 2056 regsvr32.exe regsvr32.exe PID 2056 wrote to memory of 2116 2056 regsvr32.exe regsvr32.exe PID 2116 wrote to memory of 2640 2116 regsvr32.exe explorer.exe PID 2116 wrote to memory of 2640 2116 regsvr32.exe explorer.exe PID 2116 wrote to memory of 2640 2116 regsvr32.exe explorer.exe PID 2116 wrote to memory of 2640 2116 regsvr32.exe explorer.exe PID 2116 wrote to memory of 2640 2116 regsvr32.exe explorer.exe PID 2640 wrote to memory of 3492 2640 explorer.exe reg.exe PID 2640 wrote to memory of 3492 2640 explorer.exe reg.exe PID 2640 wrote to memory of 3768 2640 explorer.exe reg.exe PID 2640 wrote to memory of 3768 2640 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\another_dll.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\another_dll.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ftdgkevsui /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\another_dll.dll\"" /SC ONCE /Z /ST 05:44 /ET 05:564⤵
- Creates scheduled task(s)
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\another_dll.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\another_dll.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Visteqqhtax" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Oyfvtovmchfe" /d "0"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\another_dll.dllMD5
660a42ba7aa190de6de83e577e691b41
SHA1987d0ea16d3ee9f434be471020ad301bde6853e6
SHA2561c61d76eea89db878348b2de168304396cbe5d404f503a423ed05ae7e7598354
SHA512cedf73578bf9d4e91f5d1b9dd1da2c1cfebdf8b468106821996cf61326079096e8373d0085b35cc1668d09e27d8f44d1994ff61b51bbd8e304f4d07305452f86
-
\Users\Admin\AppData\Local\Temp\another_dll.dllMD5
660a42ba7aa190de6de83e577e691b41
SHA1987d0ea16d3ee9f434be471020ad301bde6853e6
SHA2561c61d76eea89db878348b2de168304396cbe5d404f503a423ed05ae7e7598354
SHA512cedf73578bf9d4e91f5d1b9dd1da2c1cfebdf8b468106821996cf61326079096e8373d0085b35cc1668d09e27d8f44d1994ff61b51bbd8e304f4d07305452f86
-
memory/416-117-0x0000000000000000-mapping.dmp
-
memory/2116-121-0x0000000000000000-mapping.dmp
-
memory/2640-123-0x0000000000000000-mapping.dmp
-
memory/2640-126-0x0000000003330000-0x0000000003331000-memory.dmpFilesize
4KB
-
memory/2640-127-0x0000000002E80000-0x0000000002EA1000-memory.dmpFilesize
132KB
-
memory/2824-114-0x0000000000000000-mapping.dmp
-
memory/3004-118-0x0000000003010000-0x0000000003011000-memory.dmpFilesize
4KB
-
memory/3004-119-0x0000000003010000-0x0000000003011000-memory.dmpFilesize
4KB
-
memory/3004-116-0x0000000002C20000-0x0000000002C41000-memory.dmpFilesize
132KB
-
memory/3004-115-0x0000000000000000-mapping.dmp
-
memory/3492-124-0x0000000000000000-mapping.dmp
-
memory/3768-125-0x0000000000000000-mapping.dmp