Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-12-2021 20:00
Static task
static1
Behavioral task
behavioral1
Sample
ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dll
Resource
win7-en-20211208
General
-
Target
ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dll
-
Size
1.8MB
-
MD5
2f43f8973f17f78a09839a38f6427011
-
SHA1
808c88c6ef79d862cb4adb957613d3b367a736c1
-
SHA256
ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa
-
SHA512
0c4f39f0d850513186de75625f1e2c2365a6b31ca553df4e354650333be8c5643843fc3e21344a44f9d4a3ad227b2605b0ea658de708c51e9a012b41d950f4b9
Malware Config
Extracted
qakbot
403.10
cullinan
1640170781
14.96.108.245:61202
182.191.92.203:995
136.232.34.70:443
93.48.80.198:995
140.82.49.12:443
32.221.229.7:443
24.152.219.253:995
31.35.28.29:443
96.37.113.36:993
190.39.205.165:443
79.173.195.234:443
39.49.66.100:995
103.139.242.30:22
79.167.192.206:995
45.9.20.200:2211
24.95.61.62:443
37.210.226.125:61202
103.139.242.30:995
70.163.1.219:443
103.143.8.71:6881
76.169.147.192:32103
136.143.11.232:443
63.153.187.104:443
24.53.49.240:443
94.200.181.154:995
149.135.101.20:443
67.209.195.198:443
209.210.95.228:32100
96.80.109.57:995
80.14.196.176:2222
38.70.253.226:2222
24.222.20.254:443
102.65.38.67:443
217.128.93.27:2222
106.51.48.170:50001
218.101.110.3:995
82.152.39.39:443
24.178.196.158:2222
74.15.2.252:2222
103.142.10.177:443
217.165.123.47:61200
89.101.97.139:443
120.150.218.241:995
117.248.109.38:21
190.73.3.148:2222
105.106.30.144:443
186.64.87.213:443
96.21.251.127:2222
111.125.245.116:995
182.176.180.73:443
188.159.111.126:443
178.153.86.181:443
31.215.70.105:443
73.151.236.31:443
121.175.104.13:32100
182.56.66.96:443
41.228.22.180:443
217.164.247.241:2222
103.139.242.30:990
173.21.10.71:2222
59.6.7.83:61200
121.175.104.13:443
76.25.142.196:443
71.74.12.34:443
94.60.254.81:443
201.172.31.95:80
187.162.59.232:995
65.100.174.110:8443
100.1.119.41:443
70.51.134.181:2222
79.160.207.214:443
40.134.247.125:995
70.224.68.92:443
105.198.236.99:995
173.25.166.81:443
176.205.152.44:443
108.4.67.252:443
109.12.111.14:443
24.55.112.61:443
50.237.134.22:995
189.174.46.65:995
75.188.35.168:443
187.189.86.168:443
114.79.148.170:443
176.24.150.197:443
95.5.133.68:995
86.98.52.117:443
200.54.14.34:80
72.252.201.34:995
103.139.242.30:443
103.139.242.30:465
103.139.242.30:993
78.101.89.174:2222
78.101.89.174:443
73.5.119.219:443
23.233.146.92:443
89.137.52.44:443
74.5.148.57:443
68.186.192.69:443
50.33.112.74:995
70.93.80.154:995
75.169.58.229:32100
63.143.92.99:995
217.39.100.89:443
46.9.77.245:995
173.71.147.134:995
75.110.250.187:443
185.249.85.205:443
65.100.174.110:443
82.78.212.133:443
83.110.107.123:443
59.88.168.108:443
65.128.74.102:443
67.165.206.193:993
68.204.7.158:443
78.101.82.198:995
80.6.192.58:443
41.97.234.150:995
114.79.145.28:443
188.54.96.91:443
50.238.6.36:443
217.165.11.65:61200
103.143.8.71:995
2.178.67.97:61202
86.198.237.51:2222
88.253.171.236:995
187.172.146.123:443
92.167.4.71:2222
189.30.244.252:995
194.36.28.26:443
84.199.230.66:443
14.96.67.177:443
182.56.57.23:995
87.70.118.51:443
93.48.58.123:2222
69.46.15.180:443
23.82.128.108:443
5.36.7.212:443
200.75.131.234:443
82.77.137.101:995
187.201.90.81:443
201.172.31.95:443
216.238.72.121:443
216.238.71.31:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2100 regsvr32.exe -
Drops file in System32 directory 2 IoCs
Processes:
regsvr32.exeregsvr32.exedescription ioc process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt regsvr32.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\a2fc8e03 = 9c58cb5fa506223cbde56d8f08eafe3166082f2b662452592d6e6a55cc33db explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\6748a6ec = 0af85c6cce3660e98e5bd237e7937a4d09ae88b8ff00f3a0fa086c0c49a6237c8a75c54296c216d830d4874f03483ac0e846aada3125b65a1d1eb8c32bcb56b1122fe79431423a90467fd6c1e21c4ea066041bda4d45d5c8cfd4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\a0bdae7f = f161f8013e39887bc4caa414549741006667e508cba30802cfaddafdb4811ff85cbaeadf80055877ab54f9b514d4a0c62e66683c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\52d776a2 = a1dafc561e354899743ba57e31f0a63f17bc0da2e1dd551b538867817a30dba448f419032cefa8c7572ad2d96622bba59c5bafc87bdaa45f0834e1cdafe6892bcca7ea002d80ebc6665cd66239 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\1801c91a = 300ea3915513bd680a0b2528f58f71d96a64bf244dc683fadbe2b4bd9e14782b1c345d56805d26dff1c9b41c8c5a64c8235ecc80f220b7074c2d8bccf822426e0585bc633a2181cd01d74404daa117821ce1a111421e288b71152ea255f34b1d2180be3ecc3c1de5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\2d9e1954 = 4a50f748d8622b660517c3fbd6f44be72d5edf427ab57f8986fdb2b44f810c5840 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\1a40e966 = de30e67eb239fa716c3a81aef2671b0b0c90c25d94ee2e453a418ca383012579f3919529af1d704bba68f0f9ca2032898d5d4a394c0a90f0f9653a4250bf936ad960b13be05fe819c96d4c26ef64581c9e01bac1672111d99c8fd95fd8eb09fd39e2d12d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\dff4c189 = a4469516473696a5db9630394abfda36ba3c1341bdd2ad34507a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb\2d9e1954 = 4a50e048d8621e6068dd595ebd0f8c232fd0e400e1ae8520d695aeecc6d41d1546753a64e46a431e85c0de8f34346f2d87ad2c3e2145 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vdyeyfsb explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2092 regsvr32.exe 2092 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2092 regsvr32.exe 2100 regsvr32.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe 2100 regsvr32.exe -
Suspicious use of SendNotifyMessage 20 IoCs
Processes:
regsvr32.exepid process 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe 2092 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 432 wrote to memory of 2092 432 regsvr32.exe regsvr32.exe PID 432 wrote to memory of 2092 432 regsvr32.exe regsvr32.exe PID 432 wrote to memory of 2092 432 regsvr32.exe regsvr32.exe PID 2092 wrote to memory of 1116 2092 regsvr32.exe explorer.exe PID 2092 wrote to memory of 1116 2092 regsvr32.exe explorer.exe PID 2092 wrote to memory of 1116 2092 regsvr32.exe explorer.exe PID 2092 wrote to memory of 1116 2092 regsvr32.exe explorer.exe PID 2092 wrote to memory of 1116 2092 regsvr32.exe explorer.exe PID 1116 wrote to memory of 2724 1116 explorer.exe schtasks.exe PID 1116 wrote to memory of 2724 1116 explorer.exe schtasks.exe PID 1116 wrote to memory of 2724 1116 explorer.exe schtasks.exe PID 1328 wrote to memory of 2100 1328 regsvr32.exe regsvr32.exe PID 1328 wrote to memory of 2100 1328 regsvr32.exe regsvr32.exe PID 1328 wrote to memory of 2100 1328 regsvr32.exe regsvr32.exe PID 2100 wrote to memory of 3872 2100 regsvr32.exe explorer.exe PID 2100 wrote to memory of 3872 2100 regsvr32.exe explorer.exe PID 2100 wrote to memory of 3872 2100 regsvr32.exe explorer.exe PID 2100 wrote to memory of 3872 2100 regsvr32.exe explorer.exe PID 2100 wrote to memory of 3872 2100 regsvr32.exe explorer.exe PID 3872 wrote to memory of 1076 3872 explorer.exe reg.exe PID 3872 wrote to memory of 1076 3872 explorer.exe reg.exe PID 3872 wrote to memory of 1224 3872 explorer.exe reg.exe PID 3872 wrote to memory of 1224 3872 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dll2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn rxfoeagr /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dll\"" /SC ONCE /Z /ST 06:19 /ET 06:314⤵
- Creates scheduled task(s)
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dll"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Nhatpp" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Duihzwliw" /d "0"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dllMD5
2f43f8973f17f78a09839a38f6427011
SHA1808c88c6ef79d862cb4adb957613d3b367a736c1
SHA256ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa
SHA5120c4f39f0d850513186de75625f1e2c2365a6b31ca553df4e354650333be8c5643843fc3e21344a44f9d4a3ad227b2605b0ea658de708c51e9a012b41d950f4b9
-
C:\Windows\System32\CatRoot2\dberr.txtMD5
589088aff5333b9c462b91ff72358459
SHA155bd09715728e2cb86a194da732a0d841532b520
SHA256bc3feb717e90f22b802674d9d3ae2f8e1fb77db407db670f6319c2d26442d82e
SHA51219aa9a607c097ca9d4febfa449fca102777167476c603de57fc8fa3a834519969e05e3e234b2d581fbbcf7d9ef72b9254d0ab5192b15625e3aeb8123b3b6c144
-
\Users\Admin\AppData\Local\Temp\ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa.dllMD5
2f43f8973f17f78a09839a38f6427011
SHA1808c88c6ef79d862cb4adb957613d3b367a736c1
SHA256ad3d76e5b5bca64010c2317e586508581f0d0981e006e79d189af0c3ce2a67aa
SHA5120c4f39f0d850513186de75625f1e2c2365a6b31ca553df4e354650333be8c5643843fc3e21344a44f9d4a3ad227b2605b0ea658de708c51e9a012b41d950f4b9
-
memory/1076-129-0x0000000000000000-mapping.dmp
-
memory/1116-118-0x0000000000000000-mapping.dmp
-
memory/1116-120-0x0000000002E10000-0x0000000002E11000-memory.dmpFilesize
4KB
-
memory/1116-121-0x0000000002E10000-0x0000000002E11000-memory.dmpFilesize
4KB
-
memory/1116-122-0x0000000002A20000-0x0000000002A41000-memory.dmpFilesize
132KB
-
memory/1224-130-0x0000000000000000-mapping.dmp
-
memory/2092-115-0x0000000000000000-mapping.dmp
-
memory/2092-116-0x0000000000770000-0x00000000008BA000-memory.dmpFilesize
1.3MB
-
memory/2092-117-0x0000000010000000-0x00000000101DC000-memory.dmpFilesize
1.9MB
-
memory/2100-127-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB
-
memory/2100-124-0x0000000000000000-mapping.dmp
-
memory/2724-119-0x0000000000000000-mapping.dmp
-
memory/3872-128-0x0000000000000000-mapping.dmp
-
memory/3872-132-0x0000000002B10000-0x0000000002B11000-memory.dmpFilesize
4KB
-
memory/3872-131-0x0000000002B10000-0x0000000002B11000-memory.dmpFilesize
4KB
-
memory/3872-133-0x0000000000270000-0x0000000000291000-memory.dmpFilesize
132KB