Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-12-2021 08:00
Static task
static1
Behavioral task
behavioral1
Sample
2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll
Resource
win7-en-20211208
General
-
Target
2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll
-
Size
858KB
-
MD5
4f2bfea5068bf0f963e778f4f61cd99c
-
SHA1
797d596d9ef376747671cb373207043a5dbaccec
-
SHA256
2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8
-
SHA512
654adb2549cefb51bff892dd0c9964804ff3616496187b855995aab8596e03500d3d0170f90e2ee575fd383e80b341d97d2bb1191febcc4d36630b08d96f15ce
Malware Config
Extracted
qakbot
403.10
cullinan
1639333530
65.100.174.110:443
173.21.10.71:2222
140.82.49.12:443
190.73.3.148:2222
76.25.142.196:443
71.74.12.34:443
31.215.98.160:443
93.48.80.198:995
45.9.20.200:2211
41.228.22.180:443
109.12.111.14:443
63.143.92.99:995
120.150.218.241:995
94.60.254.81:443
86.148.6.51:443
218.101.110.3:995
216.238.71.31:443
207.246.112.221:443
216.238.72.121:443
216.238.71.31:995
207.246.112.221:995
216.238.72.121:995
186.64.87.195:443
73.151.236.31:443
78.191.12.29:995
67.165.206.193:993
68.186.192.69:443
65.100.174.110:8443
89.137.52.44:443
75.188.35.168:995
105.198.236.99:995
182.176.180.73:443
103.142.10.177:443
136.232.34.70:443
68.204.7.158:443
27.223.92.142:995
102.65.38.67:443
189.175.200.244:80
100.1.119.41:443
73.140.38.124:443
73.171.4.177:443
89.101.97.139:443
24.229.150.54:995
72.252.201.34:995
39.49.44.85:995
2.222.167.138:443
96.37.113.36:993
117.248.109.38:21
39.43.130.50:995
75.169.58.229:32100
24.55.112.61:443
27.5.4.111:2222
197.89.144.207:443
73.5.119.219:443
136.143.11.232:443
86.98.36.211:443
106.220.76.130:443
129.208.139.229:995
45.46.53.140:2222
190.229.210.128:465
91.178.126.51:995
189.18.181.24:995
185.53.147.51:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2848 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\a7238972 = 87450a2472612fd7c68f8d27b70fc05d27e743da657de23922588b0ef1d8e6d9d08596863281af05c888d9ea60dfe3136cbb6684ed5559f5de explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\2a003e59 = a3147cc6e5961f36fc3e03223d03df27656ea5a2691a9760ab5153fc36cb52cd5535868ac4c3238a23021cd6fb2fc8e1062af27903d81d3267c3ff720b03c46313ccc65ccf4eb1 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\1ddece6b = c45361e99a16ca6f151abc13bb13eb34d2bff093e8afd915c46105375c3f09ef8990674c6cee explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\a562a90e = ac7005f0b893c8296cb3d204a706fc141669201447a801f522a07a538a7ec3c91f92716623197eb68cdd70d5cc9a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\60d681e1 = 461372261970de2f69845ca807b4688750bd4e18750a79ae2c7eb78d57c846 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\554951af = 73f3be07b32308d0deda48d97df649e87fdcc00a920319f8e21ed5980b7289fd40a8ce66e8c462efe3517078f007ae41627e372c4d6b7b266f8e26c9d8eaf30f1c057dda645d08377ad686 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\2a003e59 = a3146bc6e5962a8b8b7f374f7e0d51dcbec6e8bc8ff8add2bdb7152bebc30f1da427187067e8982230be0b378d7bba8030d3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\1f9fee17 = 6c8a140e5df46fe4a8386a484041ea8543db7853e035a817da4b3cb23e0df0d7c2bcc2111922307dee945cea08c918305ac8e8df5855a7abf37f06fe554fc9d40b1f17a6d4ea43d6f26e652e34a5648ae9e28345a9e95aa0c9fcc053d03e76e2fac1c50e3a97d1e8bc691f7f620c02b66b5861e4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zouatkyal\d86ae684 = b8d19b527c36b54da4e392bf41053b6bc240b70b44d9ebbc4b04b74ceb152b018d5f1a4b explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2588 regsvr32.exe 2588 regsvr32.exe 2848 regsvr32.exe 2848 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2588 regsvr32.exe 2848 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1008 wrote to memory of 2588 1008 regsvr32.exe regsvr32.exe PID 1008 wrote to memory of 2588 1008 regsvr32.exe regsvr32.exe PID 1008 wrote to memory of 2588 1008 regsvr32.exe regsvr32.exe PID 2588 wrote to memory of 1348 2588 regsvr32.exe explorer.exe PID 2588 wrote to memory of 1348 2588 regsvr32.exe explorer.exe PID 2588 wrote to memory of 1348 2588 regsvr32.exe explorer.exe PID 2588 wrote to memory of 1348 2588 regsvr32.exe explorer.exe PID 2588 wrote to memory of 1348 2588 regsvr32.exe explorer.exe PID 1348 wrote to memory of 2876 1348 explorer.exe schtasks.exe PID 1348 wrote to memory of 2876 1348 explorer.exe schtasks.exe PID 1348 wrote to memory of 2876 1348 explorer.exe schtasks.exe PID 3012 wrote to memory of 2848 3012 regsvr32.exe regsvr32.exe PID 3012 wrote to memory of 2848 3012 regsvr32.exe regsvr32.exe PID 3012 wrote to memory of 2848 3012 regsvr32.exe regsvr32.exe PID 2848 wrote to memory of 3132 2848 regsvr32.exe explorer.exe PID 2848 wrote to memory of 3132 2848 regsvr32.exe explorer.exe PID 2848 wrote to memory of 3132 2848 regsvr32.exe explorer.exe PID 2848 wrote to memory of 3132 2848 regsvr32.exe explorer.exe PID 2848 wrote to memory of 3132 2848 regsvr32.exe explorer.exe PID 3132 wrote to memory of 860 3132 explorer.exe reg.exe PID 3132 wrote to memory of 860 3132 explorer.exe reg.exe PID 3132 wrote to memory of 1096 3132 explorer.exe reg.exe PID 3132 wrote to memory of 1096 3132 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn lhxphxp /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll\"" /SC ONCE /Z /ST 21:42 /ET 21:544⤵
- Creates scheduled task(s)
PID:2876
-
-
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ttvyslwvhne" /d "0"4⤵PID:860
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ilpdyahglto" /d "0"4⤵PID:1096
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll
MD54f2bfea5068bf0f963e778f4f61cd99c
SHA1797d596d9ef376747671cb373207043a5dbaccec
SHA2562599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8
SHA512654adb2549cefb51bff892dd0c9964804ff3616496187b855995aab8596e03500d3d0170f90e2ee575fd383e80b341d97d2bb1191febcc4d36630b08d96f15ce
-
\Users\Admin\AppData\Local\Temp\2599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8.dll
MD54f2bfea5068bf0f963e778f4f61cd99c
SHA1797d596d9ef376747671cb373207043a5dbaccec
SHA2562599965afc0a2ae60c8b61f82ecaf6a92918dd795d95121f951658a32ac737f8
SHA512654adb2549cefb51bff892dd0c9964804ff3616496187b855995aab8596e03500d3d0170f90e2ee575fd383e80b341d97d2bb1191febcc4d36630b08d96f15ce