Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-12-2021 20:12
Static task
static1
Behavioral task
behavioral1
Sample
7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll
Resource
win7-en-20211208
General
-
Target
7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll
-
Size
456KB
-
MD5
1d18144f5aed798fda3dd86a316a7c7e
-
SHA1
01e73a919703d9dcdad4ac901d05a5a5a4071584
-
SHA256
7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948
-
SHA512
4e7ef7f043c297630b6ce00912f262a69ad0113a8f9ac7bd63b04540fd6329f609347824529b2d28f735701d8ab669fc50821ca7cbe26b77c502725038a108bc
Malware Config
Extracted
qakbot
402.363
tr
1632817399
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
120.151.47.189:443
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
76.25.142.196:443
181.118.183.94:443
120.150.218.241:995
185.250.148.74:443
95.77.223.148:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
105.157.55.133:995
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 764 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\821a39d6 = 00e7b49b32f19b70fd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\7231c177 = ba3cb1dcdb620d0c6f439bcb52e57b8619e3acd02eebe3aeb02a757c1fe1f5f5604b933ed3c22198898e5d130c9039cb1d379afb220c14b0f3d351abb573104ce983aeb76cdd50b441a8063eb0ce9e60a47451c00a78daec7c83de17e21d5192756fda explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\d78ae81 = 532de85cd09dbf9ba1574fbc849c0b5c223ff660dc870c41342d94d62dae70d00b527531abd3a71eb515015032099406eca0902678e556b1c33003969eaf6d170d7ea93ba13fcc69b66f3b09c43e87ea61d1764f8942fd237c12810e703e8205d535c87353d443 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\38e77ecf = 35c77a6831c10c892b04d2db311a33a3d200da66132b6fa1148f7490fa352853130e977082c539d45c0879c5118fc0b8b904fb86d0699070cbfb17ce51952b5aac9e454655888775a443693bd453df47e01fbadb8b2382101773c3b925908e5dce3b23679e88f4b9d084d3fa28eb3652fc340cd1ae0aac9503f68e8af0ba4d42653465 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\3aa65eb3 = edb1190ba57e0497587a45ae782e10f7812f6c840ab8e4ad35ed64a380cdb9f22e1d272ca12a5db260 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\ff12765c = 0171b18e79ed739f06add72453bc93e8e2f24246fd535522e0569b8cd709465d91d9f8b6502a4d1b8c5ce6867aa18fa556dcfcf3db7e0732d52db1c170 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\47ae1139 = 204a1933aa8f9d4c2e2b9c6868a71e458d89a9af00f2a54d5df7cb477e0a91b78501d61d08b34ebae1638c0143169dc75ad5802bc6b858ce161d282b6459f5abceed3f1f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\805b19aa = 1f9a4f1e9b852726ebb6508e8d714bf149c808cd19916450be305291df46b0ddffbf086f1e68cc0b688db1643b1d0a02ce1935c5a65a1618eaa5215a6820173d24eb67f7762be1b6f649fc11b587cb73436687634fa8689be69654087d6942d4c95612b96dfa7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Elnfhkigco\d78ae81 = 532dff5cd09d8ac0995cb10f2f459ab8635fc70b4ece1de426728ce10091de43723bb51c532425c19b6375c395376b4075c3b9ab823e508c2eab9ea84f79e1c459f2c1bdf0f49fee32c7e544aee90fd45964 explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid process 2740 rundll32.exe 2740 rundll32.exe 764 regsvr32.exe 764 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 2740 rundll32.exe 764 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 2552 wrote to memory of 2740 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2740 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2740 2552 rundll32.exe rundll32.exe PID 2740 wrote to memory of 3636 2740 rundll32.exe explorer.exe PID 2740 wrote to memory of 3636 2740 rundll32.exe explorer.exe PID 2740 wrote to memory of 3636 2740 rundll32.exe explorer.exe PID 2740 wrote to memory of 3636 2740 rundll32.exe explorer.exe PID 2740 wrote to memory of 3636 2740 rundll32.exe explorer.exe PID 3636 wrote to memory of 1396 3636 explorer.exe schtasks.exe PID 3636 wrote to memory of 1396 3636 explorer.exe schtasks.exe PID 3636 wrote to memory of 1396 3636 explorer.exe schtasks.exe PID 1244 wrote to memory of 764 1244 regsvr32.exe regsvr32.exe PID 1244 wrote to memory of 764 1244 regsvr32.exe regsvr32.exe PID 1244 wrote to memory of 764 1244 regsvr32.exe regsvr32.exe PID 764 wrote to memory of 1816 764 regsvr32.exe explorer.exe PID 764 wrote to memory of 1816 764 regsvr32.exe explorer.exe PID 764 wrote to memory of 1816 764 regsvr32.exe explorer.exe PID 764 wrote to memory of 1816 764 regsvr32.exe explorer.exe PID 764 wrote to memory of 1816 764 regsvr32.exe explorer.exe PID 1816 wrote to memory of 3604 1816 explorer.exe reg.exe PID 1816 wrote to memory of 3604 1816 explorer.exe reg.exe PID 1816 wrote to memory of 900 1816 explorer.exe reg.exe PID 1816 wrote to memory of 900 1816 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn szhdmczceq /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll\"" /SC ONCE /Z /ST 12:03 /ET 12:154⤵
- Creates scheduled task(s)
PID:1396
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ematyewrzy" /d "0"4⤵PID:3604
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ohrruoiunid" /d "0"4⤵PID:900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll
MD51d18144f5aed798fda3dd86a316a7c7e
SHA101e73a919703d9dcdad4ac901d05a5a5a4071584
SHA2567f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948
SHA5124e7ef7f043c297630b6ce00912f262a69ad0113a8f9ac7bd63b04540fd6329f609347824529b2d28f735701d8ab669fc50821ca7cbe26b77c502725038a108bc
-
\Users\Admin\AppData\Local\Temp\7f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948.dll
MD51d18144f5aed798fda3dd86a316a7c7e
SHA101e73a919703d9dcdad4ac901d05a5a5a4071584
SHA2567f425dcd6bebafba15f5f0887dd4701cf2d848b05c21fe429c9c2d37826ac948
SHA5124e7ef7f043c297630b6ce00912f262a69ad0113a8f9ac7bd63b04540fd6329f609347824529b2d28f735701d8ab669fc50821ca7cbe26b77c502725038a108bc