Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
05-11-2021 10:35
Static task
static1
Behavioral task
behavioral1
Sample
236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll
Resource
win7-en-20211104
General
-
Target
236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll
-
Size
196KB
-
MD5
1d4952cbe998312fd2bf810535db8a20
-
SHA1
9667cbfa70ed5f116212be862d8301935c278ceb
-
SHA256
236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4
-
SHA512
582ab995fe6b6d1f6bc9ddb95a80c01c776f7d21e7d8e381795172b76ce6500dc2e8847a87cdcc3d35d916d19bdb122e237c75e9425643458d6881a0d24deff2
Malware Config
Extracted
qakbot
403.1
notset
1635958698
89.137.52.44:443
94.60.254.81:443
189.146.41.71:443
93.147.212.206:443
71.13.93.154:2222
136.143.11.232:443
100.1.119.41:443
189.223.33.109:443
45.46.53.140:2222
86.97.8.204:443
71.13.93.154:6881
111.250.29.138:443
181.118.183.27:443
71.13.93.154:2083
24.139.72.117:443
24.229.150.54:995
24.55.112.61:443
76.25.142.196:443
72.27.126.188:995
207.246.112.221:995
207.246.112.221:443
190.73.3.148:2222
109.177.30.138:995
181.99.138.30:465
109.228.255.59:443
94.200.181.154:443
103.150.40.76:995
216.238.71.31:443
216.238.72.121:443
216.238.72.121:995
216.238.71.31:995
177.172.5.228:995
201.172.31.95:80
67.165.206.193:993
50.194.160.233:32100
92.59.35.196:2222
89.101.97.139:443
176.35.109.202:2222
140.82.49.12:443
109.133.93.127:995
50.194.160.233:443
86.8.177.143:443
91.178.126.51:995
194.36.28.190:443
93.48.80.198:995
81.250.153.227:2222
93.48.58.123:2222
75.188.35.168:443
45.9.20.200:2211
201.137.10.225:443
173.21.10.71:2222
65.100.174.110:8443
189.135.98.193:443
103.143.8.71:443
41.235.72.90:443
117.248.109.38:21
117.198.145.234:443
39.49.42.25:995
174.206.67.116:443
71.74.12.34:443
197.89.11.249:443
86.98.1.197:443
123.252.190.14:443
136.232.34.70:443
105.198.236.99:995
188.55.235.234:995
182.176.180.73:443
27.223.92.142:995
185.53.147.51:443
75.169.58.229:32100
162.244.227.34:443
73.151.236.31:443
72.252.201.69:465
109.12.111.14:443
72.252.201.69:995
216.201.162.158:443
39.52.224.170:995
188.26.158.202:443
2.222.167.138:443
103.142.10.177:443
75.66.88.33:443
115.186.190.72:995
50.194.160.233:465
94.110.12.148:995
103.116.178.85:993
73.25.109.183:2222
120.150.218.241:995
47.72.219.120:995
86.173.96.126:443
77.57.204.78:443
115.96.64.9:995
196.207.140.40:995
103.27.50.179:995
78.191.49.39:995
96.246.158.154:995
70.93.80.154:443
88.253.105.24:443
27.5.5.31:2222
212.216.213.88:443
87.99.107.124:443
81.149.119.231:2222
103.116.178.85:995
68.186.192.69:443
85.226.176.123:2222
189.218.21.60:443
71.51.165.241:443
72.188.33.223:443
81.174.162.180:995
109.162.235.198:995
85.219.187.72:995
85.54.179.210:2222
99.42.19.10:443
143.92.137.106:443
79.160.207.214:443
96.21.251.127:2222
37.208.162.27:443
86.220.112.26:2222
5.224.28.151:995
77.255.12.88:443
189.252.140.141:32101
176.78.108.235:443
81.241.252.59:2078
117.215.85.185:443
91.116.157.170:443
109.49.27.234:443
77.79.56.210:443
213.177.130.71:443
86.121.202.42:443
178.43.41.104:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1880 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\a33d836 = 1d93cf57c39e797ba010091630d9c0c47b4501b15b35fcff5629ea9d16e9a402e82f21215e69210d88efb66e0d1813883b028f417046a59564c540ef5d98da78dc85e0d65bfea0c4ca4d7d9094c8b52bb6d685e8c488ce56e1f660d94bf56ab0534d772406 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\b0ce9f2f = 20c25997d36fec6ba67713def51be072da572d98f3127e63bdb2e107289ede6fd9baa5395d92f6c5f8857fdb477126ec6f6eed537088b3a33b36 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\b28fbf53 = 4a57d303590c72619512ebe028915f936cae99fa66aaecbbffb22115774c9b0c69d598b0c19f00d20f4ff1c02d9f08656aa6a888c2f0e00f9fae220c285e6d96b02c6ed6f81b4da8aaa67d3aa525b6853fcb31b711fa0d634504956411adfd84476e3b4adcadf74ca83866090c explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pnfhinalufeg explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\3fac0878 = 404e14cfaf4930242af004c38084fabb7badf0ff681e84a1015ff38dadf25401432e443da918b72cef43970b50bfe21e394c381d817cd85eeb97cef8e510fdadc42697d923d0a844ca158e01d5b4f2a137987a7276a1045ce057e6001301ae0f9a7af5f71198 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\872f84a = 7079d8f0e0f9ba527017a91b1a948c23bb09cb1ed496f74d09dc4b8cda4a0f32134b25a2e4fc27dcc5705f8cffc9c9eaf5684a2a0f0c825488234ce80079dc4dd1c2ac92614abb2d5894cc6b42c6e50831 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\cdc6d0a5 = cac951696857b89520d5ccce3dab19a35a0c9291d9d68d5077db64d6d430b27228d9d961d70b8ad571798f95baf0f1af0c310dc5b096e1ec explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\757ab7c0 = 2955bc8892927307c7aa6cacad675293363676e90a8ee994b2eec54970f4d89a09a505aee9358994ef07706753835e330cd396abdbcd3b8c373b591f4590c06060fc7f7ae949d3611e01e6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\40e5678e = 1bc37e190c8ddb42d4ea5a5a8d785c350e7e9e052c20c8cf645db033d11cde1bbb0d9e8a3e907250fb41eead4e1657f938354e9376b483325001eb861f4a8e42 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Pnfhinalufeg\3fac0878 = 404e03cfaf49055dabb7feae05be537129e9013eb67ed8f5e01e35d00ece0ca4fb9bd118570dc00337a9623f8ecb71dcac077e8df5cd2ac9f1af21b3f682f860f5231168b047a8288296e0d935e268b2882cd2f9e00ff16aa37ef7924c48abdac769f542e4fd0e9e60fd84e18f153c180bfc9c33fbe147917077ae explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 368 regsvr32.exe 1880 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 368 regsvr32.exe 1880 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1896 wrote to memory of 368 1896 regsvr32.exe regsvr32.exe PID 1896 wrote to memory of 368 1896 regsvr32.exe regsvr32.exe PID 1896 wrote to memory of 368 1896 regsvr32.exe regsvr32.exe PID 1896 wrote to memory of 368 1896 regsvr32.exe regsvr32.exe PID 1896 wrote to memory of 368 1896 regsvr32.exe regsvr32.exe PID 1896 wrote to memory of 368 1896 regsvr32.exe regsvr32.exe PID 1896 wrote to memory of 368 1896 regsvr32.exe regsvr32.exe PID 368 wrote to memory of 1484 368 regsvr32.exe explorer.exe PID 368 wrote to memory of 1484 368 regsvr32.exe explorer.exe PID 368 wrote to memory of 1484 368 regsvr32.exe explorer.exe PID 368 wrote to memory of 1484 368 regsvr32.exe explorer.exe PID 368 wrote to memory of 1484 368 regsvr32.exe explorer.exe PID 368 wrote to memory of 1484 368 regsvr32.exe explorer.exe PID 1484 wrote to memory of 1360 1484 explorer.exe schtasks.exe PID 1484 wrote to memory of 1360 1484 explorer.exe schtasks.exe PID 1484 wrote to memory of 1360 1484 explorer.exe schtasks.exe PID 1484 wrote to memory of 1360 1484 explorer.exe schtasks.exe PID 1648 wrote to memory of 1160 1648 taskeng.exe regsvr32.exe PID 1648 wrote to memory of 1160 1648 taskeng.exe regsvr32.exe PID 1648 wrote to memory of 1160 1648 taskeng.exe regsvr32.exe PID 1648 wrote to memory of 1160 1648 taskeng.exe regsvr32.exe PID 1648 wrote to memory of 1160 1648 taskeng.exe regsvr32.exe PID 1160 wrote to memory of 1880 1160 regsvr32.exe regsvr32.exe PID 1160 wrote to memory of 1880 1160 regsvr32.exe regsvr32.exe PID 1160 wrote to memory of 1880 1160 regsvr32.exe regsvr32.exe PID 1160 wrote to memory of 1880 1160 regsvr32.exe regsvr32.exe PID 1160 wrote to memory of 1880 1160 regsvr32.exe regsvr32.exe PID 1160 wrote to memory of 1880 1160 regsvr32.exe regsvr32.exe PID 1160 wrote to memory of 1880 1160 regsvr32.exe regsvr32.exe PID 1880 wrote to memory of 1952 1880 regsvr32.exe explorer.exe PID 1880 wrote to memory of 1952 1880 regsvr32.exe explorer.exe PID 1880 wrote to memory of 1952 1880 regsvr32.exe explorer.exe PID 1880 wrote to memory of 1952 1880 regsvr32.exe explorer.exe PID 1880 wrote to memory of 1952 1880 regsvr32.exe explorer.exe PID 1880 wrote to memory of 1952 1880 regsvr32.exe explorer.exe PID 1952 wrote to memory of 1624 1952 explorer.exe reg.exe PID 1952 wrote to memory of 1624 1952 explorer.exe reg.exe PID 1952 wrote to memory of 1624 1952 explorer.exe reg.exe PID 1952 wrote to memory of 1624 1952 explorer.exe reg.exe PID 1952 wrote to memory of 1500 1952 explorer.exe reg.exe PID 1952 wrote to memory of 1500 1952 explorer.exe reg.exe PID 1952 wrote to memory of 1500 1952 explorer.exe reg.exe PID 1952 wrote to memory of 1500 1952 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn pjicnid /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll\"" /SC ONCE /Z /ST 10:34 /ET 10:464⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {6FA1AE10-6E4A-4268-9647-F412D7FF5553} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Mnmisjyfa" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Rlmyywcdoii" /d "0"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dllMD5
1d4952cbe998312fd2bf810535db8a20
SHA19667cbfa70ed5f116212be862d8301935c278ceb
SHA256236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4
SHA512582ab995fe6b6d1f6bc9ddb95a80c01c776f7d21e7d8e381795172b76ce6500dc2e8847a87cdcc3d35d916d19bdb122e237c75e9425643458d6881a0d24deff2
-
\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dllMD5
1d4952cbe998312fd2bf810535db8a20
SHA19667cbfa70ed5f116212be862d8301935c278ceb
SHA256236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4
SHA512582ab995fe6b6d1f6bc9ddb95a80c01c776f7d21e7d8e381795172b76ce6500dc2e8847a87cdcc3d35d916d19bdb122e237c75e9425643458d6881a0d24deff2
-
memory/368-56-0x0000000000000000-mapping.dmp
-
memory/368-57-0x00000000760C1000-0x00000000760C3000-memory.dmpFilesize
8KB
-
memory/1160-64-0x0000000000000000-mapping.dmp
-
memory/1360-62-0x0000000000000000-mapping.dmp
-
memory/1484-59-0x0000000000000000-mapping.dmp
-
memory/1484-63-0x0000000000080000-0x00000000000B4000-memory.dmpFilesize
208KB
-
memory/1484-61-0x00000000747F1000-0x00000000747F3000-memory.dmpFilesize
8KB
-
memory/1484-58-0x00000000000C0000-0x00000000000C2000-memory.dmpFilesize
8KB
-
memory/1500-76-0x0000000000000000-mapping.dmp
-
memory/1624-74-0x0000000000000000-mapping.dmp
-
memory/1880-67-0x0000000000000000-mapping.dmp
-
memory/1896-55-0x000007FEFBDE1000-0x000007FEFBDE3000-memory.dmpFilesize
8KB
-
memory/1952-71-0x0000000000000000-mapping.dmp
-
memory/1952-75-0x00000000000F0000-0x0000000000124000-memory.dmpFilesize
208KB