Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-12-2021 04:00
Static task
static1
Behavioral task
behavioral1
Sample
017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
Resource
win7-en-20211208
General
-
Target
017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
-
Size
1.8MB
-
MD5
bc5790b25d7c562724938d58612f3466
-
SHA1
3472be4b855c1fc8242ea45022fb020e7e224b19
-
SHA256
017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6
-
SHA512
c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db
Malware Config
Extracted
qakbot
403.10
cullinan
1640170781
14.96.108.245:61202
182.191.92.203:995
136.232.34.70:443
93.48.80.198:995
140.82.49.12:443
32.221.229.7:443
24.152.219.253:995
31.35.28.29:443
96.37.113.36:993
190.39.205.165:443
79.173.195.234:443
39.49.66.100:995
103.139.242.30:22
79.167.192.206:995
45.9.20.200:2211
24.95.61.62:443
37.210.226.125:61202
103.139.242.30:995
70.163.1.219:443
103.143.8.71:6881
76.169.147.192:32103
136.143.11.232:443
63.153.187.104:443
24.53.49.240:443
94.200.181.154:995
149.135.101.20:443
67.209.195.198:443
209.210.95.228:32100
96.80.109.57:995
80.14.196.176:2222
38.70.253.226:2222
24.222.20.254:443
102.65.38.67:443
217.128.93.27:2222
106.51.48.170:50001
218.101.110.3:995
82.152.39.39:443
24.178.196.158:2222
74.15.2.252:2222
103.142.10.177:443
217.165.123.47:61200
89.101.97.139:443
120.150.218.241:995
117.248.109.38:21
190.73.3.148:2222
105.106.30.144:443
186.64.87.213:443
96.21.251.127:2222
111.125.245.116:995
182.176.180.73:443
188.159.111.126:443
178.153.86.181:443
31.215.70.105:443
73.151.236.31:443
121.175.104.13:32100
182.56.66.96:443
41.228.22.180:443
217.164.247.241:2222
103.139.242.30:990
173.21.10.71:2222
59.6.7.83:61200
121.175.104.13:443
76.25.142.196:443
71.74.12.34:443
94.60.254.81:443
201.172.31.95:80
187.162.59.232:995
65.100.174.110:8443
100.1.119.41:443
70.51.134.181:2222
79.160.207.214:443
40.134.247.125:995
70.224.68.92:443
105.198.236.99:995
173.25.166.81:443
176.205.152.44:443
108.4.67.252:443
109.12.111.14:443
24.55.112.61:443
50.237.134.22:995
189.174.46.65:995
75.188.35.168:443
187.189.86.168:443
114.79.148.170:443
176.24.150.197:443
95.5.133.68:995
86.98.52.117:443
200.54.14.34:80
72.252.201.34:995
103.139.242.30:443
103.139.242.30:465
103.139.242.30:993
78.101.89.174:2222
78.101.89.174:443
73.5.119.219:443
23.233.146.92:443
89.137.52.44:443
74.5.148.57:443
68.186.192.69:443
50.33.112.74:995
70.93.80.154:995
75.169.58.229:32100
63.143.92.99:995
217.39.100.89:443
46.9.77.245:995
173.71.147.134:995
75.110.250.187:443
185.249.85.205:443
65.100.174.110:443
82.78.212.133:443
83.110.107.123:443
59.88.168.108:443
65.128.74.102:443
67.165.206.193:993
68.204.7.158:443
78.101.82.198:995
80.6.192.58:443
41.97.234.150:995
114.79.145.28:443
188.54.96.91:443
50.238.6.36:443
217.165.11.65:61200
103.143.8.71:995
2.178.67.97:61202
86.198.237.51:2222
88.253.171.236:995
187.172.146.123:443
92.167.4.71:2222
189.30.244.252:995
194.36.28.26:443
84.199.230.66:443
14.96.67.177:443
182.56.57.23:995
87.70.118.51:443
93.48.58.123:2222
69.46.15.180:443
23.82.128.108:443
5.36.7.212:443
200.75.131.234:443
82.77.137.101:995
187.201.90.81:443
201.172.31.95:443
216.238.72.121:443
216.238.71.31:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2752 regsvr32.exe -
Drops file in System32 directory 2 IoCs
Processes:
regsvr32.exeregsvr32.exedescription ioc process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt regsvr32.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\2c95d525 = fde693f6b0aa82 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\53dcbad3 = 7051dd12166854b41e6635127cc9df03 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\2c95d525 = fde684f6b0aab7a4ff1f8be80f43fd24bcd092b85c175934a4b8f1b0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\66436a9d = 217f2401b5b21dcdf10521fda8999321705d662a4cdf1bf5dd30db88fbe55d51a159bc623f0fc0a7998baf6702c68318c8ff98cdc718a173236565da0b0c11f1ed858968c4c0bb6666fc9edca2377ab62bfbdba4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\a1b6620e = 0e9af19635bacb9259d2e6946d3702fb713c03dbc433da4c7c1f36c75f7115c4aa8aee0714d7d696476d2f92a7 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\190a056b = 7ff6942a4cb3bb7b334284aa7660764f3f66810950d12d661532ba845b3ae2e98a0e4544cc096187b5ed1b273e818ab0cb7f8aafe0edd900601a5eef16e0d5e0ceaccca3b9547fdd7af76713d6e94deec251e063a83b206fa69052a022a8dfd6ee5c661ab1e544243d83646523614f3d08ca8cd63c026e38dc731a018f03873d4a0b55a11ad7a42ddae980aeb4d6df26bb9f57289ec55da9ef1f9a7724de61cc8f7ada41b6d72c0c8fd75bda9ec6f789a3ac3fc28b56026c2c69 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\1b4b2517 = 9d4fa99043dd6d804c1962a59ca896929653d2c9263a6c9fc4b79e2f2b39f473be18d3c9fcfb4f78329356d92834ed5bdeb20e58d7faafe6535926f66d3ce4259c12ad5a94049e10923160388905e64b97a99eed18 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\a3f74272 = 9355e745fe19c87d8cd6436330c2c884494ea600d702096341a88e521324d61c284f6a92b7332acfbad208d04f85f473f21cb8aacda717b9ecfc65b91c68ed9cd26a8f0b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ctrboshidhu\deff0df8 = 86c786c9c297935f926fe808c45330c5c7bbf46b5efe explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3736 regsvr32.exe 3736 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3736 regsvr32.exe 2752 regsvr32.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe 2752 regsvr32.exe -
Suspicious use of SendNotifyMessage 20 IoCs
Processes:
regsvr32.exepid process 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe 3736 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 3068 wrote to memory of 3736 3068 regsvr32.exe regsvr32.exe PID 3068 wrote to memory of 3736 3068 regsvr32.exe regsvr32.exe PID 3068 wrote to memory of 3736 3068 regsvr32.exe regsvr32.exe PID 3736 wrote to memory of 3912 3736 regsvr32.exe explorer.exe PID 3736 wrote to memory of 3912 3736 regsvr32.exe explorer.exe PID 3736 wrote to memory of 3912 3736 regsvr32.exe explorer.exe PID 3736 wrote to memory of 3912 3736 regsvr32.exe explorer.exe PID 3736 wrote to memory of 3912 3736 regsvr32.exe explorer.exe PID 3912 wrote to memory of 2280 3912 explorer.exe schtasks.exe PID 3912 wrote to memory of 2280 3912 explorer.exe schtasks.exe PID 3912 wrote to memory of 2280 3912 explorer.exe schtasks.exe PID 1300 wrote to memory of 2752 1300 regsvr32.exe regsvr32.exe PID 1300 wrote to memory of 2752 1300 regsvr32.exe regsvr32.exe PID 1300 wrote to memory of 2752 1300 regsvr32.exe regsvr32.exe PID 2752 wrote to memory of 3688 2752 regsvr32.exe explorer.exe PID 2752 wrote to memory of 3688 2752 regsvr32.exe explorer.exe PID 2752 wrote to memory of 3688 2752 regsvr32.exe explorer.exe PID 2752 wrote to memory of 3688 2752 regsvr32.exe explorer.exe PID 2752 wrote to memory of 3688 2752 regsvr32.exe explorer.exe PID 3688 wrote to memory of 1196 3688 explorer.exe reg.exe PID 3688 wrote to memory of 1196 3688 explorer.exe reg.exe PID 3688 wrote to memory of 3716 3688 explorer.exe reg.exe PID 3688 wrote to memory of 3716 3688 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn lyyafrv /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll\"" /SC ONCE /Z /ST 19:04 /ET 19:164⤵
- Creates scheduled task(s)
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Xyfcegusauk" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Muqhdazdezm" /d "0"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dllMD5
bc5790b25d7c562724938d58612f3466
SHA13472be4b855c1fc8242ea45022fb020e7e224b19
SHA256017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6
SHA512c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db
-
C:\Windows\System32\CatRoot2\dberr.txtMD5
73434e1fd6facf8fe053ff69f36166e9
SHA12e61ea9d2a868da502b2120c368a77c6f92506d0
SHA256260986b1480c683cffb7fd28e3ae44855a49c17af9f31acd0f7113c4a42bc92f
SHA512da1da90544b9e014dbfeaa2ce8d2afca8a6887582396b671f5188d60d2b067737c1b317d8f465015778553492b3d52242be4db769529d6933ad6b67e59161c62
-
\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dllMD5
bc5790b25d7c562724938d58612f3466
SHA13472be4b855c1fc8242ea45022fb020e7e224b19
SHA256017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6
SHA512c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db
-
memory/1196-129-0x0000000000000000-mapping.dmp
-
memory/2280-119-0x0000000000000000-mapping.dmp
-
memory/2752-127-0x0000000000570000-0x00000000006BA000-memory.dmpFilesize
1.3MB
-
memory/2752-124-0x0000000000000000-mapping.dmp
-
memory/3688-133-0x0000000002DB0000-0x0000000002DD1000-memory.dmpFilesize
132KB
-
memory/3688-132-0x0000000003790000-0x0000000003791000-memory.dmpFilesize
4KB
-
memory/3688-131-0x0000000003790000-0x0000000003791000-memory.dmpFilesize
4KB
-
memory/3688-128-0x0000000000000000-mapping.dmp
-
memory/3716-130-0x0000000000000000-mapping.dmp
-
memory/3736-116-0x0000000000E00000-0x0000000000EAE000-memory.dmpFilesize
696KB
-
memory/3736-117-0x0000000010000000-0x00000000101DC000-memory.dmpFilesize
1.9MB
-
memory/3736-115-0x0000000000000000-mapping.dmp
-
memory/3912-120-0x00000000043F0000-0x00000000043F1000-memory.dmpFilesize
4KB
-
memory/3912-118-0x0000000000000000-mapping.dmp
-
memory/3912-122-0x0000000002850000-0x0000000002871000-memory.dmpFilesize
132KB
-
memory/3912-121-0x00000000043F0000-0x00000000043F1000-memory.dmpFilesize
4KB