Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
05-11-2021 10:35
Static task
static1
Behavioral task
behavioral1
Sample
236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll
Resource
win7-en-20211104
General
-
Target
236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll
-
Size
196KB
-
MD5
1d4952cbe998312fd2bf810535db8a20
-
SHA1
9667cbfa70ed5f116212be862d8301935c278ceb
-
SHA256
236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4
-
SHA512
582ab995fe6b6d1f6bc9ddb95a80c01c776f7d21e7d8e381795172b76ce6500dc2e8847a87cdcc3d35d916d19bdb122e237c75e9425643458d6881a0d24deff2
Malware Config
Extracted
qakbot
403.1
notset
1635958698
89.137.52.44:443
94.60.254.81:443
189.146.41.71:443
93.147.212.206:443
71.13.93.154:2222
136.143.11.232:443
100.1.119.41:443
189.223.33.109:443
45.46.53.140:2222
86.97.8.204:443
71.13.93.154:6881
111.250.29.138:443
181.118.183.27:443
71.13.93.154:2083
24.139.72.117:443
24.229.150.54:995
24.55.112.61:443
76.25.142.196:443
72.27.126.188:995
207.246.112.221:995
207.246.112.221:443
190.73.3.148:2222
109.177.30.138:995
181.99.138.30:465
109.228.255.59:443
94.200.181.154:443
103.150.40.76:995
216.238.71.31:443
216.238.72.121:443
216.238.72.121:995
216.238.71.31:995
177.172.5.228:995
201.172.31.95:80
67.165.206.193:993
50.194.160.233:32100
92.59.35.196:2222
89.101.97.139:443
176.35.109.202:2222
140.82.49.12:443
109.133.93.127:995
50.194.160.233:443
86.8.177.143:443
91.178.126.51:995
194.36.28.190:443
93.48.80.198:995
81.250.153.227:2222
93.48.58.123:2222
75.188.35.168:443
45.9.20.200:2211
201.137.10.225:443
173.21.10.71:2222
65.100.174.110:8443
189.135.98.193:443
103.143.8.71:443
41.235.72.90:443
117.248.109.38:21
117.198.145.234:443
39.49.42.25:995
174.206.67.116:443
71.74.12.34:443
197.89.11.249:443
86.98.1.197:443
123.252.190.14:443
136.232.34.70:443
105.198.236.99:995
188.55.235.234:995
182.176.180.73:443
27.223.92.142:995
185.53.147.51:443
75.169.58.229:32100
162.244.227.34:443
73.151.236.31:443
72.252.201.69:465
109.12.111.14:443
72.252.201.69:995
216.201.162.158:443
39.52.224.170:995
188.26.158.202:443
2.222.167.138:443
103.142.10.177:443
75.66.88.33:443
115.186.190.72:995
50.194.160.233:465
94.110.12.148:995
103.116.178.85:993
73.25.109.183:2222
120.150.218.241:995
47.72.219.120:995
86.173.96.126:443
77.57.204.78:443
115.96.64.9:995
196.207.140.40:995
103.27.50.179:995
78.191.49.39:995
96.246.158.154:995
70.93.80.154:443
88.253.105.24:443
27.5.5.31:2222
212.216.213.88:443
87.99.107.124:443
81.149.119.231:2222
103.116.178.85:995
68.186.192.69:443
85.226.176.123:2222
189.218.21.60:443
71.51.165.241:443
72.188.33.223:443
81.174.162.180:995
109.162.235.198:995
85.219.187.72:995
85.54.179.210:2222
99.42.19.10:443
143.92.137.106:443
79.160.207.214:443
96.21.251.127:2222
37.208.162.27:443
86.220.112.26:2222
5.224.28.151:995
77.255.12.88:443
189.252.140.141:32101
176.78.108.235:443
81.241.252.59:2078
117.215.85.185:443
91.116.157.170:443
109.49.27.234:443
77.79.56.210:443
213.177.130.71:443
86.121.202.42:443
178.43.41.104:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 3380 regsvr32.exe 3380 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 3380 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 2668 wrote to memory of 3380 2668 regsvr32.exe regsvr32.exe PID 2668 wrote to memory of 3380 2668 regsvr32.exe regsvr32.exe PID 2668 wrote to memory of 3380 2668 regsvr32.exe regsvr32.exe PID 3380 wrote to memory of 3988 3380 regsvr32.exe explorer.exe PID 3380 wrote to memory of 3988 3380 regsvr32.exe explorer.exe PID 3380 wrote to memory of 3988 3380 regsvr32.exe explorer.exe PID 3380 wrote to memory of 3988 3380 regsvr32.exe explorer.exe PID 3380 wrote to memory of 3988 3380 regsvr32.exe explorer.exe PID 3988 wrote to memory of 556 3988 explorer.exe schtasks.exe PID 3988 wrote to memory of 556 3988 explorer.exe schtasks.exe PID 3988 wrote to memory of 556 3988 explorer.exe schtasks.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn xcbjfcfe /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\236f9f37dc2604ed8d3faee0b07fc6bb8f4dde68ed89a137023f641ad6076ca4.dll\"" /SC ONCE /Z /ST 23:54 /ET 24:064⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/556-117-0x0000000000000000-mapping.dmp
-
memory/3380-115-0x0000000000000000-mapping.dmp
-
memory/3988-116-0x0000000000000000-mapping.dmp
-
memory/3988-118-0x00000000037B0000-0x00000000037B1000-memory.dmpFilesize
4KB
-
memory/3988-119-0x00000000037B0000-0x00000000037B1000-memory.dmpFilesize
4KB
-
memory/3988-120-0x00000000031A0000-0x00000000031D4000-memory.dmpFilesize
208KB
-
memory/3988-121-0x00000000037B0000-0x00000000037B1000-memory.dmpFilesize
4KB