Overview
overview
10Static
static
029b714502...39.dll
windows10_x64
10061dfb6a25...52.dll
windows10_x64
1006d55f75d7...d2.dll
windows10_x64
1024401ac43b...65.dll
windows10_x64
3260e2d5769...40.dll
windows10_x64
1026cd036960...18.dll
windows10_x64
102a0a88a2e5...4a.dll
windows10_x64
32f33217d51...94.dll
windows10_x64
10336cdd146b...da.dll
windows10_x64
10417c1828d9...73.dll
windows10_x64
104d3095c796...ee.dll
windows10_x64
1054e526fe05...4c.dll
windows10_x64
16402b33d72...3b.dll
windows10_x64
1064c044cb3e...db.dll
windows10_x64
10671f477c30...4e.dll
windows10_x64
1067785724b6...ce.dll
windows10_x64
36c6934613a...fb.dll
windows10_x64
106f63742c25...fd.dll
windows10_x64
10813a9b03c6...48.dll
windows10_x64
10839ac59a78...e3.dll
windows10_x64
1085d0b72fe8...39.dll
windows10_x64
10a34cb4049e...c4.dll
windows10_x64
10a55c19c552...60.dll
windows10_x64
10a98e988f03...48.dll
windows10_x64
10acc31f97c3...27.dll
windows10_x64
10b194eec1e5...c7.dll
windows10_x64
10bac73f9cce...00.dll
windows10_x64
10c5d2f0da18...0c.dll
windows10_x64
10d559ee0a26...7e.dll
windows10_x64
1db5276c0d5...79.dll
windows10_x64
10e5efde9740...15.dll
windows10_x64
10fe028e6f99...1c.dll
windows10_x64
10Resubmissions
01-11-2021 12:31
211101-pp5r3ahha4 1031-10-2021 09:03
211031-k1bwxacfaq 1014-10-2021 01:44
211014-b6aflafeg4 10Analysis
-
max time kernel
3831s -
max time network
3839s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
31-10-2021 09:03
Static task
static1
Behavioral task
behavioral1
Sample
029b714502283599a5efb86d41c48fd46751ab727b707bde620e517ec3aa3c39.dll
Resource
win10-en-20210920
Behavioral task
behavioral2
Sample
061dfb6a251e536f700a295239652dafab34aee5e5145320d1d57e3fca5e5d52.dll
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
06d55f75d7c76d6924c0b8439fa3cda28b89284204a6db982e4baf3a37fb35d2.dll
Resource
win10-en-20210920
Behavioral task
behavioral4
Sample
24401ac43b6dbb7048cb27425b4f0f76a9b20b6b4fffa33ff8091c3c11ef8365.dll
Resource
win10-en-20211014
Behavioral task
behavioral5
Sample
260e2d5769f0a50a7b49d4c43059221eb7acc4b9fc460763e0cfcd793f2a6840.dll
Resource
win10-en-20210920
Behavioral task
behavioral6
Sample
26cd03696045fb93b415b022fa6bc832098394bf362f4b4c4e897e9550d12618.dll
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
2a0a88a2e5f9cafa10a48d63bdfcdf965b72c25978ab46cf28e795dbedc9624a.dll
Resource
win10-en-20211014
Behavioral task
behavioral8
Sample
2f33217d51117cf3d6c6ed3ab50724964367fc7a85e1bb1dc87d241b8d953894.dll
Resource
win10-en-20210920
Behavioral task
behavioral9
Sample
336cdd146beca939c6d1e3e3c00cc10ec2d6e859a18d350bff937ad5194c27da.dll
Resource
win10-en-20211014
Behavioral task
behavioral10
Sample
417c1828d98ba4f05f7a2edb71a9105f0aebf3d554393970b96e59d4db7b4473.dll
Resource
win10-en-20210920
Behavioral task
behavioral11
Sample
4d3095c7965c7bdd32b81b72c95f767134915cf08ebe1237721ed5208de4beee.dll
Resource
win10-en-20211014
Behavioral task
behavioral12
Sample
54e526fe059a3f25cdaed954e32f44eadffb3e51548658409468dcf2d63b634c.dll
Resource
win10-en-20210920
Behavioral task
behavioral13
Sample
6402b33d729c8bb44881747a8f397f4aec408bf5e18b9af6fd86cdfa3f96323b.dll
Resource
win10-en-20211014
Behavioral task
behavioral14
Sample
64c044cb3ec26babdd17107b2aa6ded60b22473c4e2943e1fcc03df8bc2e0edb.dll
Resource
win10-en-20210920
Behavioral task
behavioral15
Sample
671f477c3039786c5f3553760377be03b91bfb66f31ba9370ed2193192cf5b4e.dll
Resource
win10-en-20210920
Behavioral task
behavioral16
Sample
67785724b67ecd79b7cd4c64a249794b9abda8b680fe52a0ce85bb83ddfb6cce.dll
Resource
win10-en-20211014
Behavioral task
behavioral17
Sample
6c6934613abde41f82043bb7c269a1e614920a83a2b90eaf325ca7b998183efb.dll
Resource
win10-en-20210920
Behavioral task
behavioral18
Sample
6f63742c25fd3a2dae5995f182254c253003066488ef86e754f661e8ba1d76fd.dll
Resource
win10-en-20211014
Behavioral task
behavioral19
Sample
813a9b03c6c1caec4eca8a867dcfbda7860bca6a5d481acb4c131c1a868d4b48.dll
Resource
win10-en-20210920
Behavioral task
behavioral20
Sample
839ac59a78a0f2c446edb3cccbaf0bc5781605a1f848878f9e96cd5e0e425fe3.dll
Resource
win10-en-20210920
Behavioral task
behavioral21
Sample
85d0b72fe822fd6c22827b4da1917d2c1f2d9faa838e003e78e533384ea80939.dll
Resource
win10-en-20211014
Behavioral task
behavioral22
Sample
a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll
Resource
win10-en-20210920
Behavioral task
behavioral23
Sample
a55c19c552f579041ad7289aceeb400da215fe29aedbf0c14e8a66be1bee8360.dll
Resource
win10-en-20211014
Behavioral task
behavioral24
Sample
a98e988f03fd5be37c66878017a3dcd741adf75bf1df1ed6dde2c15ee213bb48.dll
Resource
win10-en-20210920
Behavioral task
behavioral25
Sample
acc31f97c3124a317f2939944777e103311f4b0c51788d2e562c24a08e2afe27.dll
Resource
win10-en-20211014
Behavioral task
behavioral26
Sample
b194eec1e599feeadfd463b06727e8b3c73a72a4c20017e5cfaf89fbf6d365c7.dll
Resource
win10-en-20210920
Behavioral task
behavioral27
Sample
bac73f9ccebf93009a6037145a9c71a2e8b916956f6a7e6a4f4b53b4b50b7a00.dll
Resource
win10-en-20210920
Behavioral task
behavioral28
Sample
c5d2f0da18fb33a25b53fd8b9b98f0bfa95458e3c0feb687852f469167a0110c.dll
Resource
win10-en-20211014
Behavioral task
behavioral29
Sample
d559ee0a26fa500cd57fac25d58ba4319a794f329c8711e89afac3c281f9dd7e.dll
Resource
win10-en-20210920
Behavioral task
behavioral30
Sample
db5276c0d5ecd3b338a98983001a5b8cbbf5b488bf420d8cc0267801b963f479.dll
Resource
win10-en-20211014
Behavioral task
behavioral31
Sample
e5efde974017a12a573548f12b5473887601c897e8660eb57803c18523f72815.dll
Resource
win10-en-20210920
Behavioral task
behavioral32
Sample
fe028e6f99a02a016643a2db14534fa977a78f45b36ff9db5b60e7e709f5541c.dll
Resource
win10-en-20211014
General
-
Target
a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll
-
Size
833KB
-
MD5
5f00035c9fb5b740abaee795979b82ed
-
SHA1
6c980a4d7cc1461645acd4c763a86b9c4e896707
-
SHA256
a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
-
SHA512
92f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f
Malware Config
Extracted
qakbot
402.363
tr
1633597626
120.150.218.241:995
185.250.148.74:443
89.137.52.44:443
66.103.170.104:2222
86.8.177.143:443
216.201.162.158:443
174.54.193.186:443
103.148.120.144:443
188.50.169.158:443
124.123.42.115:2222
140.82.49.12:443
199.27.127.129:443
81.241.252.59:2078
209.142.97.161:995
209.50.20.255:443
73.230.205.91:443
200.232.214.222:995
103.142.10.177:443
2.222.167.138:443
41.228.22.180:443
122.11.220.212:2222
78.191.58.219:995
47.22.148.6:443
74.72.237.54:443
217.17.56.163:465
96.57.188.174:2078
94.200.181.154:443
37.210.152.224:995
201.93.111.2:995
202.134.178.157:443
89.101.97.139:443
73.52.50.32:443
188.55.235.110:995
27.223.92.142:995
181.118.183.94:443
136.232.34.70:443
186.32.163.199:443
72.173.78.211:443
76.25.142.196:443
45.46.53.140:2222
98.157.235.126:443
173.21.10.71:2222
73.151.236.31:443
71.74.12.34:443
75.75.179.226:443
167.248.117.81:443
67.165.206.193:993
47.40.196.233:2222
72.252.201.69:443
181.4.53.6:465
109.12.111.14:443
24.171.50.5:443
24.139.72.117:443
24.55.112.61:443
24.229.150.54:995
77.57.204.78:443
81.250.153.227:2222
49.33.237.65:443
66.177.215.152:50010
177.170.201.134:995
75.188.35.168:443
120.151.47.189:443
173.25.162.221:443
201.6.246.227:995
66.177.215.152:443
217.17.56.163:2222
202.165.32.158:2222
39.52.229.8:995
42.60.70.14:443
73.140.38.124:443
167.248.100.227:443
63.70.164.200:443
69.30.186.190:443
189.131.221.201:443
68.204.7.158:443
181.84.114.46:443
167.248.99.149:443
177.94.21.110:995
50.54.32.149:443
189.224.181.39:443
24.119.214.7:443
63.70.164.200:995
177.94.125.59:995
82.18.173.253:2222
73.130.180.25:443
217.17.56.163:2078
162.244.227.34:443
75.66.88.33:443
206.47.134.234:2222
167.248.54.34:2222
73.77.87.137:443
181.4.53.6:443
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
68.186.192.69:443
162.210.220.137:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
159.2.51.200:2222
110.174.64.179:995
187.101.25.96:32100
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
97.98.130.50:443
196.117.224.53:995
191.191.38.8:443
188.210.210.122:443
96.46.103.109:2222
37.117.191.19:2222
197.90.137.161:61201
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
217.17.56.163:443
62.23.194.38:443
62.23.194.41:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 1512 regsvr32.exe 2276 regsvr32.exe 1484 regsvr32.exe 3652 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\ebcgmjiwfc = "regsvr32.exe -s \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Qxejgzftttyl\\gpyboptheqas.dll\"" explorer.exe -
Drops file in System32 directory 6 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\t4[1] explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 948 schtasks.exe 1144 schtasks.exe 3236 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\b7d37c7a = af105e0c3ba05dd634627784ad5a55da0cedb268dded878aa6ef942226e28ea138f9b12d70f1ecb685789b654c01c5ce255310 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d772ff58490c0127cbc1fe6b15c7ab7ffdc390ecb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\d2e3b63 = 10b9c2e5c8f9968d8514d1479bb9dda40e27a78d58d939218b31577c7457fccc20ccebb58a60c326cbce33ff75f1e6da592af5165ef6cb61ba6bdb4bbf323bd4d68c23387e603070e0794267a856bd223dca39bc3ca09ce12d3db24cd6763183dfd54be16693b152c6729fecc91bed0a063c6f207e9d816cd399d120b5156592e53c7dbe1270d54b604d79bc35613d41b167b9178c82678c065891cb68c580217844fd057f625382e37303c4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\b5925c06 = 2e791ba6f8829bda1925b89cb01eaa24244a7b8eed1f5807979c566f69447f0195333c3a70fe5747a867e84df9d43e9a explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d477f559490c0127cbc1fe6b15c7ab7ffdce9be0b21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d472f358490c0127cbc1fe6b15c7ab7ffec295eeb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d777f053490c0127cbc1fe6b15c7ab7ffdc796eeb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d674f555490c0127cbc1fe6b15c7ab7ffcc59ae1b21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\b5925c06 = 2e791ba6f882ab181b25b89cb01eaa24244a7b8eed1f5807979c566f69447f0195333c3a70fe5747a867e84df9d43e9a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d673f350490c0127cbc1fe6b15c7ab7ffcc194efb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bde1d270ff52490c0127cbc1fe6b15c7a87ef8ce92ebb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee3df7ff756490c0127cbc1fe6b15c7ab7cf5ce92eeb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d674f555490c0127cbc1fe6b15c7ab7ffcc395eeb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d477f559490c0127cbc1fe6b15c7ab7ffec49aecb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\47f884db = 86dfcd7f3c77cb5e9a662c66733be116147ed917454846be286833a4f21fa56a319fed6d924efb85e734bcdf741b79b51e625f1c53186bbc4091147e49068607f67e1096a9f25e141b858b8b44e7a9aa14c034b5169925f7ea0c2be65487 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\47f884db = 86dfcd7f3c771f579a662c66733be116147ed917454846be286833a4f21fa56a319fed6d924efb85e734bcdf741b79b51e625f1c53186bbc4091147e49068607f67e1096a9f25e141b858b8b44e7a9aa14c034b5169925f7ea0c2be65487 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee3df7ff756490c0127cbc1fe6b15c7ab7ffcc79befb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\72675495 = c8f546e5c8c90a6206b880330a96d78bfe65929cb676ab552e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075db9f086424ea566b7f11758e30050c9d91356eac1993bd59695da776e0de explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d472f358490c0127cbc1fe6b15c7ab7ffec49aecb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075cc9f086411241d3ae75902f7b9e7dd77f152000a0f2ccfc8f65dd388f4e1f8b3e06261048fcb1122a144c1974fd43d1c4fcdb9 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d67ef254490c0127cbc1fe6b15c7ab7ffdc796eeb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d777f053490c0127cbc1fe6b15c7ab7ffdc390ecb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d772ff58490c0127cbc1fe6b15c7ab7ffdc193edb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d77ef757490c0127cbc1fe6b15c7ab7ffdcf92efb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\f6f1b1f = 227740df14d86265742cb2bf2c8888f904b340682723c2a708f66ea53475309eae213ff585 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d674f555490c0127cbc1fe6b15c7ab7ffcc79befb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xsifioiuy\38b1eb2d = c075c59f086411241d3ae61302f9bee0d67ef254490c0127cbc1fe6b15c7ab7ffccf97ecb21b2ef7ed4d7625fc0306a96bc990200d6844409ba64193ea7b explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 3828 rundll32.exe 3828 rundll32.exe 1512 regsvr32.exe 1512 regsvr32.exe 2276 regsvr32.exe 2276 regsvr32.exe 3652 regsvr32.exe 3652 regsvr32.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
rundll32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 3828 rundll32.exe 1512 regsvr32.exe 2276 regsvr32.exe 3652 regsvr32.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exeexplorer.exeregsvr32.exeregsvr32.exedescription pid process target process PID 2892 wrote to memory of 3828 2892 rundll32.exe rundll32.exe PID 2892 wrote to memory of 3828 2892 rundll32.exe rundll32.exe PID 2892 wrote to memory of 3828 2892 rundll32.exe rundll32.exe PID 3828 wrote to memory of 892 3828 rundll32.exe explorer.exe PID 3828 wrote to memory of 892 3828 rundll32.exe explorer.exe PID 3828 wrote to memory of 892 3828 rundll32.exe explorer.exe PID 3828 wrote to memory of 892 3828 rundll32.exe explorer.exe PID 3828 wrote to memory of 892 3828 rundll32.exe explorer.exe PID 892 wrote to memory of 1144 892 explorer.exe schtasks.exe PID 892 wrote to memory of 1144 892 explorer.exe schtasks.exe PID 892 wrote to memory of 1144 892 explorer.exe schtasks.exe PID 1992 wrote to memory of 1512 1992 regsvr32.exe regsvr32.exe PID 1992 wrote to memory of 1512 1992 regsvr32.exe regsvr32.exe PID 1992 wrote to memory of 1512 1992 regsvr32.exe regsvr32.exe PID 1512 wrote to memory of 1796 1512 regsvr32.exe explorer.exe PID 1512 wrote to memory of 1796 1512 regsvr32.exe explorer.exe PID 1512 wrote to memory of 1796 1512 regsvr32.exe explorer.exe PID 1512 wrote to memory of 1796 1512 regsvr32.exe explorer.exe PID 1512 wrote to memory of 1796 1512 regsvr32.exe explorer.exe PID 1796 wrote to memory of 1784 1796 explorer.exe reg.exe PID 1796 wrote to memory of 1784 1796 explorer.exe reg.exe PID 1796 wrote to memory of 2012 1796 explorer.exe reg.exe PID 1796 wrote to memory of 2012 1796 explorer.exe reg.exe PID 3656 wrote to memory of 3232 3656 regsvr32.exe regsvr32.exe PID 3656 wrote to memory of 3232 3656 regsvr32.exe regsvr32.exe PID 3656 wrote to memory of 3232 3656 regsvr32.exe regsvr32.exe PID 1796 wrote to memory of 3236 1796 explorer.exe schtasks.exe PID 1796 wrote to memory of 3236 1796 explorer.exe schtasks.exe PID 1796 wrote to memory of 3236 1796 explorer.exe schtasks.exe PID 1796 wrote to memory of 2276 1796 explorer.exe regsvr32.exe PID 1796 wrote to memory of 2276 1796 explorer.exe regsvr32.exe PID 1796 wrote to memory of 2276 1796 explorer.exe regsvr32.exe PID 892 wrote to memory of 1484 892 explorer.exe regsvr32.exe PID 892 wrote to memory of 1484 892 explorer.exe regsvr32.exe PID 892 wrote to memory of 1484 892 explorer.exe regsvr32.exe PID 2276 wrote to memory of 3792 2276 regsvr32.exe explorer.exe PID 2276 wrote to memory of 3792 2276 regsvr32.exe explorer.exe PID 2276 wrote to memory of 3792 2276 regsvr32.exe explorer.exe PID 2276 wrote to memory of 3792 2276 regsvr32.exe explorer.exe PID 2276 wrote to memory of 3792 2276 regsvr32.exe explorer.exe PID 3792 wrote to memory of 1212 3792 explorer.exe schtasks.exe PID 3792 wrote to memory of 1212 3792 explorer.exe schtasks.exe PID 3792 wrote to memory of 1212 3792 explorer.exe schtasks.exe PID 3732 wrote to memory of 948 3732 explorer.exe schtasks.exe PID 3732 wrote to memory of 948 3732 explorer.exe schtasks.exe PID 3732 wrote to memory of 948 3732 explorer.exe schtasks.exe PID 1708 wrote to memory of 3652 1708 regsvr32.exe regsvr32.exe PID 1708 wrote to memory of 3652 1708 regsvr32.exe regsvr32.exe PID 1708 wrote to memory of 3652 1708 regsvr32.exe regsvr32.exe PID 3652 wrote to memory of 1952 3652 regsvr32.exe explorer.exe PID 3652 wrote to memory of 1952 3652 regsvr32.exe explorer.exe PID 3652 wrote to memory of 1952 3652 regsvr32.exe explorer.exe PID 3652 wrote to memory of 1952 3652 regsvr32.exe explorer.exe PID 3652 wrote to memory of 1952 3652 regsvr32.exe explorer.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn zdebjizaw /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll\"" /SC ONCE /Z /ST 02:05 /ET 02:174⤵
- Creates scheduled task(s)
PID:1144
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Roaming\Microsoft\Qxejgzftttyl\gpyboptheqas.dll"4⤵
- Loads dropped DLL
PID:1484 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn mfesgrwbu /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Roaming\Microsoft\Qxejgzftttyl\gpyboptheqas.dll\"" /SC ONCE /Z /ST 10:07 /ET 10:196⤵
- Creates scheduled task(s)
PID:948
-
-
-
-
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Uotnuabg" /d "0"4⤵PID:1784
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Qxejgzftttyl" /d "0"4⤵PID:2012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /RU "NT AUTHORITY\SYSTEM" /SC ONSTART /TN 2415919104 /TR "regsvr32.exe -s "C:\ProgramData\Microsoft\Uotnuabg\xfylwslksvzslla.dll"" /NP /F4⤵
- Creates scheduled task(s)
PID:3236
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe -s "C:\ProgramData\Microsoft\Uotnuabg\xfylwslksvzslla.dll"4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /F /TN 24159191046⤵PID:1212
-
-
-
-
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll"2⤵PID:3232
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Roaming\Microsoft\Qxejgzftttyl\gpyboptheqas.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Roaming\Microsoft\Qxejgzftttyl\gpyboptheqas.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5f00035c9fb5b740abaee795979b82ed
SHA16c980a4d7cc1461645acd4c763a86b9c4e896707
SHA256a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
SHA51292f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f
-
C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll
MD55f00035c9fb5b740abaee795979b82ed
SHA16c980a4d7cc1461645acd4c763a86b9c4e896707
SHA256a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
SHA51292f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f
-
C:\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll
MD56ebeb38673e450f52b193ee9869eab57
SHA1a254c9b349cdc83b5db8a6e32b90e65c27595043
SHA2569b85041efff94d82356a34560c828af70565dad52037301dd7f7a1f93fc81e72
SHA5129c918ab9e6373d6a5ac7530c42571af492b01c30fffde476eb6b5292fc93f301f8216d7a8b6b61f1cb6d01f4ef4f24256346c95d3499605d18266fb206cffe46
-
MD5
1e7e16b8cb7b27f07b632bbc0e367e5c
SHA1913ddc9d687a121257cfd2216d2da0307771d57d
SHA256190fcacda3bb2e1272b864aca0ff5a34f8c66540db9f088ef3038e053e6d2805
SHA512c61ceef8d258ed96571a474150f244029ca0b105df16e56e209e24382ca8b997c6afae5a698d587e8b08ce49006f8af73e19329535a8baeb6ddda2c24457a3ed
-
MD5
5f00035c9fb5b740abaee795979b82ed
SHA16c980a4d7cc1461645acd4c763a86b9c4e896707
SHA256a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
SHA51292f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
5f00035c9fb5b740abaee795979b82ed
SHA16c980a4d7cc1461645acd4c763a86b9c4e896707
SHA256a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
SHA51292f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f
-
\Users\Admin\AppData\Local\Temp\a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4.dll
MD55f00035c9fb5b740abaee795979b82ed
SHA16c980a4d7cc1461645acd4c763a86b9c4e896707
SHA256a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
SHA51292f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f
-
MD5
5f00035c9fb5b740abaee795979b82ed
SHA16c980a4d7cc1461645acd4c763a86b9c4e896707
SHA256a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
SHA51292f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f
-
MD5
5f00035c9fb5b740abaee795979b82ed
SHA16c980a4d7cc1461645acd4c763a86b9c4e896707
SHA256a34cb4049eb43d455d8619607cc6e1a8c380e9d8507306e9c5bc17eaed6459c4
SHA51292f917f67ae59140909c9e6f42821c6b6396ad10e8a51b3bdfcdb86051d0967c95fe5886ae67be6cfbeef970ea8a75e6ec3f5aa56661334e6de843ed353dd46f