Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
01-12-2021 16:04
Static task
static1
Behavioral task
behavioral1
Sample
Volet2.ocx.dll
Resource
win7-en-20211104
General
-
Target
Volet2.ocx.dll
-
Size
807KB
-
MD5
70ea022ce20cc54eca56b4ef9b49fcb4
-
SHA1
d58e7bcf9c7949b8ddaf9129a9504202094b48a3
-
SHA256
3d49f30ed4cef3d532cbc73d99560d7c81db4928e8e2e81d2c83ef09196f17c1
-
SHA512
4ae829fc2976bade3f3f49144cf7d19d547c3a9936b32fcb4178cd557595d1b7dc9127c878c4502871b272dd6a75335d387accad73115c7a132c10c81143553a
Malware Config
Extracted
qakbot
403.2
obama139
1638350683
190.73.3.148:2222
39.49.13.81:995
105.198.236.99:995
136.143.11.232:443
2.222.167.138:443
197.89.11.160:443
117.248.109.38:21
174.20.72.123:443
140.82.49.12:443
78.180.170.159:995
103.142.10.177:443
120.150.218.241:995
91.178.126.51:995
81.250.153.227:2222
194.36.28.26:443
89.101.97.139:443
117.198.158.34:443
189.252.184.31:32101
38.70.253.226:2222
93.48.80.198:995
71.74.12.34:443
207.246.112.221:443
216.238.71.31:443
207.246.112.221:995
186.64.67.31:443
136.232.34.70:443
218.101.110.3:995
76.25.142.196:443
102.65.38.57:443
173.21.10.71:2222
94.60.254.81:443
45.46.53.140:2222
189.135.34.124:443
73.151.236.31:443
67.165.206.193:993
200.114.247.160:465
68.204.7.158:443
189.147.174.121:443
100.1.119.41:443
189.152.1.74:80
50.194.160.233:32100
174.206.64.101:443
50.194.160.233:443
24.229.150.54:995
109.12.111.14:443
217.17.56.163:2222
24.55.112.61:443
24.139.72.117:443
182.181.86.190:995
75.169.58.229:32100
129.208.154.145:995
217.165.237.42:443
89.137.52.44:443
73.25.109.183:2222
185.53.147.51:443
103.116.178.85:993
86.8.177.143:443
86.97.10.14:443
27.5.4.111:2222
80.6.192.58:443
101.50.103.248:995
65.100.174.110:8443
94.200.181.154:995
65.100.174.110:995
63.143.92.99:995
75.188.35.168:995
182.176.180.73:443
75.66.88.33:443
189.219.48.188:443
94.203.203.3:995
86.120.85.147:443
123.252.190.14:443
103.150.40.76:995
41.228.22.180:443
111.250.17.237:443
73.140.38.124:443
176.63.117.1:22
111.91.87.187:443
220.255.25.187:2222
92.59.35.196:2222
72.252.201.34:465
209.210.95.228:443
68.186.192.69:443
187.121.105.111:995
103.168.241.143:995
103.168.241.143:465
86.190.203.103:443
93.147.212.206:443
5.238.149.217:61202
72.252.201.34:995
24.152.219.253:995
96.37.113.36:993
45.9.20.200:2211
103.116.178.85:61200
93.48.58.123:2222
27.223.92.142:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1268 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 836 schtasks.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\4fac1d59 = 7fcf6455002555dab7bc4d6ca1cc578ca3fabb309a9ab1d571d6494358a2f3cd31a0dcfd244c3e4ccdb155d1c2af2f901512dbea72be5dbf9c96cd3cdce5dd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\57aa2e1 = 5cf2f62f42bb34a5ed42050cc210fab7c56bbb8e92dc1dd31e915a97b4255967499f6c16c8478e07627da8704038591ee766b3c55e59c2ab1adc6bcd253605e5c273c181087b269c33 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\57aa2e1 = 5cf2e12f42bb01aead1de11a99b5a8a1cac4e9837bbcd6ad134e51559931797805e4ece1da4a306aa5a71c00b98deac81cef8e31 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\32a452d3 = 233c2d7662fb75edf1f02a5dc6ad1d1241c7255e69154dc6221e13de9e240ab9a765043329ab4f8f947d084a06ecbf5f65b15d1febff63db761a6a55696227d37b0b725042473d62d245aff19cef2b6e54b9664a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\8a1835b6 = 08f7b28205f036dc60b51e7c514238c56712ea41672c4264d895d1a894874a6d076802a8dbff4faf8936f08925254bc4d25b93c3b042cf7bdd9b56cb42cb3e1145acd8fea4bf4979c43c010ba54b825d9f431192cd9f3d032f49c7724ec30f6ebd5e93e15d353a173643fb77dd41d0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\885915ca = 95b69339ff3216f8f9fc03b49ba90093ec3fe6b63d0f5738feb0d6437ae1e33fc86da96fb1268026471b90dd5c516e1babd92ce7f4dc42d62c8a55 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\7a33cd17 = ce0dc31fac74557bd205b00665a036310a7c2210695d42db9cf131a5427fca2865378631df4162182a6896667d9bee69deaf94a0035d520d23 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\30e572af = 718de7a9390601479f1087941eea8a325fe144ffaf00cad833ccbc625fa92f933dfa2323993a380b457a7dd304c5146b3fe1f77ddf9b6e446bafb4bee654315824594b523811313954c3039ff98c054c158e0f34944ba36a36a74aa7eba9f2410532617306811fa38842b7d62976c278b51e464a1282b73d5379655106f30c7bc07faac216f9aac748bf9897b77e58f6a885bb5be6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Udrjueo\f7107a3c = 3f794ee0c377381d7d987ea6a83fca0ae3579d88c9ed1162e317ec7f37ce32d390817559fa3e67 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 596 rundll32.exe 1268 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 596 rundll32.exe 1268 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1472 wrote to memory of 596 1472 rundll32.exe 28 PID 1472 wrote to memory of 596 1472 rundll32.exe 28 PID 1472 wrote to memory of 596 1472 rundll32.exe 28 PID 1472 wrote to memory of 596 1472 rundll32.exe 28 PID 1472 wrote to memory of 596 1472 rundll32.exe 28 PID 1472 wrote to memory of 596 1472 rundll32.exe 28 PID 1472 wrote to memory of 596 1472 rundll32.exe 28 PID 596 wrote to memory of 1256 596 rundll32.exe 29 PID 596 wrote to memory of 1256 596 rundll32.exe 29 PID 596 wrote to memory of 1256 596 rundll32.exe 29 PID 596 wrote to memory of 1256 596 rundll32.exe 29 PID 596 wrote to memory of 1256 596 rundll32.exe 29 PID 596 wrote to memory of 1256 596 rundll32.exe 29 PID 1256 wrote to memory of 836 1256 explorer.exe 30 PID 1256 wrote to memory of 836 1256 explorer.exe 30 PID 1256 wrote to memory of 836 1256 explorer.exe 30 PID 1256 wrote to memory of 836 1256 explorer.exe 30 PID 1052 wrote to memory of 856 1052 taskeng.exe 33 PID 1052 wrote to memory of 856 1052 taskeng.exe 33 PID 1052 wrote to memory of 856 1052 taskeng.exe 33 PID 1052 wrote to memory of 856 1052 taskeng.exe 33 PID 1052 wrote to memory of 856 1052 taskeng.exe 33 PID 856 wrote to memory of 1268 856 regsvr32.exe 34 PID 856 wrote to memory of 1268 856 regsvr32.exe 34 PID 856 wrote to memory of 1268 856 regsvr32.exe 34 PID 856 wrote to memory of 1268 856 regsvr32.exe 34 PID 856 wrote to memory of 1268 856 regsvr32.exe 34 PID 856 wrote to memory of 1268 856 regsvr32.exe 34 PID 856 wrote to memory of 1268 856 regsvr32.exe 34 PID 1268 wrote to memory of 1680 1268 regsvr32.exe 35 PID 1268 wrote to memory of 1680 1268 regsvr32.exe 35 PID 1268 wrote to memory of 1680 1268 regsvr32.exe 35 PID 1268 wrote to memory of 1680 1268 regsvr32.exe 35 PID 1268 wrote to memory of 1680 1268 regsvr32.exe 35 PID 1268 wrote to memory of 1680 1268 regsvr32.exe 35 PID 1680 wrote to memory of 2016 1680 explorer.exe 36 PID 1680 wrote to memory of 2016 1680 explorer.exe 36 PID 1680 wrote to memory of 2016 1680 explorer.exe 36 PID 1680 wrote to memory of 2016 1680 explorer.exe 36 PID 1680 wrote to memory of 580 1680 explorer.exe 38 PID 1680 wrote to memory of 580 1680 explorer.exe 38 PID 1680 wrote to memory of 580 1680 explorer.exe 38 PID 1680 wrote to memory of 580 1680 explorer.exe 38
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Volet2.ocx.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Volet2.ocx.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn fsnqwju /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\Volet2.ocx.dll\"" /SC ONCE /Z /ST 16:09 /ET 16:214⤵
- Creates scheduled task(s)
PID:836
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {504273E8-9BF6-4C03-B9B3-9622AC98B538} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\Volet2.ocx.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\Volet2.ocx.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Bhmmoyha" /d "0"5⤵PID:2016
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Gleuy" /d "0"5⤵PID:580
-
-
-
-