Resubmissions
13-01-2022 09:19
220113-laarlahafl 1011-01-2022 07:00
220111-hszlwsfae5 1004-01-2022 11:08
220104-m8skqsagcq 10Analysis
-
max time kernel
25s -
max time network
20s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
04-01-2022 11:08
Static task
static1
General
-
Target
d302a473d8f19884d38147d13ce87f54b897dad51fdc6490467bca62cc7ae937.exe.dll
-
Size
945KB
-
MD5
bb17bf13123596ba3065efc74d625a3c
-
SHA1
b589b0dee84e30e205f242a8d429b1e231b5ec5b
-
SHA256
d302a473d8f19884d38147d13ce87f54b897dad51fdc6490467bca62cc7ae937
-
SHA512
40d6bb5bb741b43a03969c40acafbc621281ad9f4fa23d3a90f07e30b01eda95227af6b96a20d48712f08b2252069e711842d71d3f1e95374db44fb7845ab427
Malware Config
Extracted
qakbot
403.10
cullinan
1639333530
65.100.174.110:443
173.21.10.71:2222
140.82.49.12:443
190.73.3.148:2222
76.25.142.196:443
71.74.12.34:443
31.215.98.160:443
93.48.80.198:995
45.9.20.200:2211
41.228.22.180:443
109.12.111.14:443
63.143.92.99:995
120.150.218.241:995
94.60.254.81:443
86.148.6.51:443
218.101.110.3:995
216.238.71.31:443
207.246.112.221:443
216.238.72.121:443
216.238.71.31:995
207.246.112.221:995
216.238.72.121:995
186.64.87.195:443
73.151.236.31:443
78.191.12.29:995
67.165.206.193:993
68.186.192.69:443
65.100.174.110:8443
89.137.52.44:443
75.188.35.168:995
105.198.236.99:995
182.176.180.73:443
103.142.10.177:443
136.232.34.70:443
68.204.7.158:443
27.223.92.142:995
102.65.38.67:443
189.175.200.244:80
100.1.119.41:443
73.140.38.124:443
73.171.4.177:443
89.101.97.139:443
24.229.150.54:995
72.252.201.34:995
39.49.44.85:995
2.222.167.138:443
96.37.113.36:993
117.248.109.38:21
39.43.130.50:995
75.169.58.229:32100
24.55.112.61:443
27.5.4.111:2222
197.89.144.207:443
73.5.119.219:443
136.143.11.232:443
86.98.36.211:443
106.220.76.130:443
129.208.139.229:995
45.46.53.140:2222
190.229.210.128:465
91.178.126.51:995
189.18.181.24:995
185.53.147.51:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 3804 regsvr32.exe 3804 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 3804 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 3520 wrote to memory of 3804 3520 regsvr32.exe regsvr32.exe PID 3520 wrote to memory of 3804 3520 regsvr32.exe regsvr32.exe PID 3520 wrote to memory of 3804 3520 regsvr32.exe regsvr32.exe PID 3804 wrote to memory of 3964 3804 regsvr32.exe explorer.exe PID 3804 wrote to memory of 3964 3804 regsvr32.exe explorer.exe PID 3804 wrote to memory of 3964 3804 regsvr32.exe explorer.exe PID 3804 wrote to memory of 3964 3804 regsvr32.exe explorer.exe PID 3804 wrote to memory of 3964 3804 regsvr32.exe explorer.exe PID 3964 wrote to memory of 960 3964 explorer.exe schtasks.exe PID 3964 wrote to memory of 960 3964 explorer.exe schtasks.exe PID 3964 wrote to memory of 960 3964 explorer.exe schtasks.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d302a473d8f19884d38147d13ce87f54b897dad51fdc6490467bca62cc7ae937.exe.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d302a473d8f19884d38147d13ce87f54b897dad51fdc6490467bca62cc7ae937.exe.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ataphrj /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\d302a473d8f19884d38147d13ce87f54b897dad51fdc6490467bca62cc7ae937.exe.dll\"" /SC ONCE /Z /ST 11:11 /ET 11:234⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/960-119-0x0000000000000000-mapping.dmp
-
memory/3804-115-0x0000000000000000-mapping.dmp
-
memory/3804-116-0x00000000045A0000-0x00000000045C3000-memory.dmpFilesize
140KB
-
memory/3804-117-0x0000000010000000-0x00000000100F5000-memory.dmpFilesize
980KB
-
memory/3964-118-0x0000000000000000-mapping.dmp
-
memory/3964-120-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/3964-121-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/3964-122-0x0000000000B10000-0x0000000000B31000-memory.dmpFilesize
132KB