Analysis
-
max time kernel
1783s -
max time network
1799s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
17-01-2022 21:34
Static task
static1
Behavioral task
behavioral1
Sample
q.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
q.dll
Resource
win10v2004-en-20220113
General
-
Target
q.dll
-
Size
1.3MB
-
MD5
9ad3a0d8b2064d12a9098952c7ac3ee2
-
SHA1
bf59513b280b6a3d4fb7bf6c5c2836fa6d5ee4a2
-
SHA256
dd8b18f31dcfa89865629c0264283f6631d38d535b077a8afb3c55d8b677075c
-
SHA512
7a7e152c08889e399af1e126efa3f74638d2273ffecc8e779d752052bf75e2288b915909cd4d633045be9cb02bb84b948a82b958e1f8bdba200787320d23374e
Malware Config
Extracted
qakbot
402.363
notset
1632819510
196.217.156.63:995
120.150.218.241:995
95.77.223.148:443
185.250.148.74:443
181.118.183.94:443
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
120.151.47.189:443
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
76.25.142.196:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1724 regsvr32.exe -
Drops file in System32 directory 6 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\t4[1] explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
netstat.exeipconfig.exenetstat.exeipconfig.exepid process 316 netstat.exe 1172 ipconfig.exe 1356 netstat.exe 1996 ipconfig.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee1b7284497e92dabea08e8792699c9df48782f362aa5257883ffb5df03709d701d1c985816de72943ad960f64cb77b3d8b1a015803aeb1f5e8f33dae9414f635d546c0ffd1bef2d93836d95c88c5558bf3bba0303bf61 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\a16ca00e = 2c3a64ecc509da3707d29040446be2f5c11ce19f10c032fb85c5fcee1d800a84c4be explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadDecisionReason = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-8c-39-73-4f-7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\593d1f66 = e6856610d501ac34b2d277345534c5e81ae9e5 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee127284497e92dabea1c4809b6f989ff18185bd65a45956813ccd21fcc0ab59af0380a8631eea298f5517612d8f1dea3b1f5654658ed97e3c20ec6e1a56036bf2404b3b08d8a3dcbe67b3ab751e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee1b7284497e92dabea08e8792699f94f68085f362aa5257883ffb5df0370ade01dcc585816de72943ad960f64cb77b3d8b1a015803aeb1f5e8f33dae9414f635d546c0ffd1bef2d93836d95c88c5558bf3bba0303bf61 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee057284494be1d546060f284b21840e8d7926f432fb72025d295a1d17961719e434ba701259056614aaa99aa89d04a95466ae869f61c7bb8f explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\43f2f741 = e1c936132175346f41befaed25ac6eca8855cf28a3159539a96c0c55988c5f7f7e3caeef35e63b27730f615a10cc6c2891056c66b4557f819336560d21dd011fa8c89cd6e4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\4b88b088 = f441fab5bea83810606db474623ad98cad866e1eb86e235c530824101c9d9cdc67bce6e974 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadDecision = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-8c-39-73-4f-7b\WpadDecision = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee1b7284497e92dabea08e8792699f94f38286f362aa5257883ffb5df0370ade01dcc585816de72943ad960f64cb77b3d8b1a015803aeb1f5e8f33dae9414f635d546c0ffd1bef2d93836d95c88c5558bf3bba0303bf61 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\de25cff8 = 04f0974b2177ec5657bb5a2a15421c06b1e67cfd5f1b6aba1bf1f2a21b7e12cbe65b8c62fb2d4b6b3ee719cc5c62747268e5cbe55ba3bd593c5227d6f0e89cbf1ee0ecd1d208e25a8e90f5047cc14ca00688eec8c9a5528aa233dfbc8462e6610cc502bf35f19708e42da0 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\3680ff02 = cca0541d9fe914442e40697c4f1617a66e8dc2ec7ba25d979db93cb0d8714de529ee99b891df4ade812b20358b028ba279de853809c69c9438d3dc27247d9198e1ae53ea4bbae60fb4eb164f72fd3bcb5521cbc64066a5b8f6d9b07836a644a391005e7743 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadNetworkName = "Network 3" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee1b7284497e92dabea08e8792699f94f38286f362aa5257883ffb5df0370ade07ddcb85816de72943ad960f64cb77b3d8b1a015803aeb1f5e8f33dae9414f635d546c0ffd1bef2d93836d95c88c5558bf3bba0303bf61 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\94f37040 = 2a2c97c7b3de1c9d94cd34b44ec7610e3978019e8b50e3d273352f5a38967df5651bc79f033c99ed02664547a07049f9947da6c91cc4683d9ba92d89f2acdcfc403148822845d4a2c693076938213a72a245ab34dedc82c0d381eb9f614e28b766db84ff9f4175a5215c2c explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee1b7284497e92dabea08e8792699c9df48782f362aa5257883ffb5df03709d700d8cf85816de72943ad960f64cb77b3d8b1a015803aeb1f5e8f33dae9414f635d546c0ffd1bef2d93836d95c88c5558bf3bba0303bf61 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\56-8c-39-73-4f-7b explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\dc64ef84 = ee6ef663b0eae87d23ec7516301e937ea2617958730fc1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\64d888e1 = 6fef4232d7e72bafd71cb615b73afc36320835aa1056d78983e5ebe2511ac0d1a83b75 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\3680ff02 = cca0541d9fe914442f96697c4f1617a66e8dc2ec7ba25d979db93cb0d8714de529ee99b891df4ade812b20358b028ba279de853809c69c9438d3dc27247d9198e1ae53ea4bbae60fb4eb164f72fd3bcb5521cbc64066a5b8f6d9b07836a644a391005e7743 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadDecisionTime = 9064cfa3f30bd801 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3} explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-8c-39-73-4f-7b\WpadDecisionReason = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee1b7284497e92dabea08e8792699c9df78581f362aa5257883ffb5df03709d703d0c885816de72943ad960f64cb77b3d8b1a015803aeb1f5e8f33dae9414f635d546c0ffd1bef2d93836d95c88c5558bf3bba0303bf61 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\ebba1fb6 = 68ee1b7284497e92dabea08e8792699f94f08381f362aa5257883ffb5df03709d70ddfca85816de72943ad960f64cb77b3d8b1a015803aeb1f5e8f33dae9414f635d546c0ffd1bef2d93836d95c88c5558bf3bba0303bf61 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Efoialoal explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Efoialoal\19d0c76b = 97e00bec56c1cffa54dca0594dcb72a8d2e72a0dde42a3a6ae77093945f88dad6232c40cefbd01ab03c6d4ca1f545e781cf76b213b247b397408f517b4becdef9de6238102514ef7a68912af80798a914b3c15118afc62293b6eede67f1ff3451c29 explorer.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exeexplorer.exeexplorer.exepid process 948 rundll32.exe 1724 regsvr32.exe 1064 explorer.exe 1476 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 948 rundll32.exe 1724 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
whoami.exenetstat.exedescription pid process Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1976 whoami.exe Token: SeDebugPrivilege 1356 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exetaskeng.exeregsvr32.exedescription pid process target process PID 1612 wrote to memory of 948 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 948 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 948 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 948 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 948 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 948 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 948 1612 rundll32.exe rundll32.exe PID 948 wrote to memory of 1476 948 rundll32.exe explorer.exe PID 948 wrote to memory of 1476 948 rundll32.exe explorer.exe PID 948 wrote to memory of 1476 948 rundll32.exe explorer.exe PID 948 wrote to memory of 1476 948 rundll32.exe explorer.exe PID 948 wrote to memory of 1476 948 rundll32.exe explorer.exe PID 948 wrote to memory of 1476 948 rundll32.exe explorer.exe PID 1476 wrote to memory of 1412 1476 explorer.exe schtasks.exe PID 1476 wrote to memory of 1412 1476 explorer.exe schtasks.exe PID 1476 wrote to memory of 1412 1476 explorer.exe schtasks.exe PID 1476 wrote to memory of 1412 1476 explorer.exe schtasks.exe PID 860 wrote to memory of 1912 860 taskeng.exe regsvr32.exe PID 860 wrote to memory of 1912 860 taskeng.exe regsvr32.exe PID 860 wrote to memory of 1912 860 taskeng.exe regsvr32.exe PID 860 wrote to memory of 1912 860 taskeng.exe regsvr32.exe PID 860 wrote to memory of 1912 860 taskeng.exe regsvr32.exe PID 1912 wrote to memory of 1724 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 1724 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 1724 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 1724 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 1724 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 1724 1912 regsvr32.exe regsvr32.exe PID 1912 wrote to memory of 1724 1912 regsvr32.exe regsvr32.exe PID 1724 wrote to memory of 1064 1724 regsvr32.exe explorer.exe PID 1724 wrote to memory of 1064 1724 regsvr32.exe explorer.exe PID 1724 wrote to memory of 1064 1724 regsvr32.exe explorer.exe PID 1724 wrote to memory of 1064 1724 regsvr32.exe explorer.exe PID 1724 wrote to memory of 1064 1724 regsvr32.exe explorer.exe PID 1724 wrote to memory of 1064 1724 regsvr32.exe explorer.exe PID 1064 wrote to memory of 1228 1064 explorer.exe reg.exe PID 1064 wrote to memory of 1228 1064 explorer.exe reg.exe PID 1064 wrote to memory of 1228 1064 explorer.exe reg.exe PID 1064 wrote to memory of 1228 1064 explorer.exe reg.exe PID 1064 wrote to memory of 324 1064 explorer.exe reg.exe PID 1064 wrote to memory of 324 1064 explorer.exe reg.exe PID 1064 wrote to memory of 324 1064 explorer.exe reg.exe PID 1064 wrote to memory of 324 1064 explorer.exe reg.exe PID 936 wrote to memory of 1836 936 taskeng.exe regsvr32.exe PID 936 wrote to memory of 1836 936 taskeng.exe regsvr32.exe PID 936 wrote to memory of 1836 936 taskeng.exe regsvr32.exe PID 936 wrote to memory of 1836 936 taskeng.exe regsvr32.exe PID 936 wrote to memory of 1836 936 taskeng.exe regsvr32.exe PID 1836 wrote to memory of 2040 1836 regsvr32.exe regsvr32.exe PID 1836 wrote to memory of 2040 1836 regsvr32.exe regsvr32.exe PID 1836 wrote to memory of 2040 1836 regsvr32.exe regsvr32.exe PID 1836 wrote to memory of 2040 1836 regsvr32.exe regsvr32.exe PID 1836 wrote to memory of 2040 1836 regsvr32.exe regsvr32.exe PID 1836 wrote to memory of 2040 1836 regsvr32.exe regsvr32.exe PID 1836 wrote to memory of 2040 1836 regsvr32.exe regsvr32.exe PID 1064 wrote to memory of 1976 1064 explorer.exe whoami.exe PID 1064 wrote to memory of 1976 1064 explorer.exe whoami.exe PID 1064 wrote to memory of 1976 1064 explorer.exe whoami.exe PID 1064 wrote to memory of 1976 1064 explorer.exe whoami.exe PID 1064 wrote to memory of 1528 1064 explorer.exe cmd.exe PID 1064 wrote to memory of 1528 1064 explorer.exe cmd.exe PID 1064 wrote to memory of 1528 1064 explorer.exe cmd.exe PID 1064 wrote to memory of 1528 1064 explorer.exe cmd.exe PID 1064 wrote to memory of 1488 1064 explorer.exe arp.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\q.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\q.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn yqjpodp /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\q.dll\"" /SC ONCE /Z /ST 22:37 /ET 22:494⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\whoami.exewhoami /all4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set4⤵
-
C:\Windows\SysWOW64\arp.exearp -a4⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
-
C:\Windows\SysWOW64\net.exenet view /all4⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\nslookup.exenslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP4⤵
-
C:\Windows\SysWOW64\net.exenet share4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share5⤵
-
C:\Windows\SysWOW64\route.exeroute print4⤵
-
C:\Windows\SysWOW64\netstat.exenetstat -nao4⤵
- Gathers network information
-
C:\Windows\SysWOW64\net.exenet localgroup4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup5⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {EAF7E911-5B89-4EC7-8D50-2471C12C188E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\q.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\q.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Fymxuee" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Onlpoorkjvg" /d "0"5⤵
-
C:\Windows\SysWOW64\whoami.exewhoami /all5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c set5⤵
-
C:\Windows\SysWOW64\arp.exearp -a5⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
-
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\nslookup.exenslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP5⤵
-
C:\Windows\SysWOW64\net.exenet share5⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share6⤵
-
C:\Windows\SysWOW64\route.exeroute print5⤵
-
C:\Windows\SysWOW64\netstat.exenetstat -nao5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exenet localgroup5⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup6⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {1E99BEAF-E40B-406C-8E6A-76386FAD031D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\q.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\q.dll"3⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\q.dllMD5
9ad3a0d8b2064d12a9098952c7ac3ee2
SHA1bf59513b280b6a3d4fb7bf6c5c2836fa6d5ee4a2
SHA256dd8b18f31dcfa89865629c0264283f6631d38d535b077a8afb3c55d8b677075c
SHA5127a7e152c08889e399af1e126efa3f74638d2273ffecc8e779d752052bf75e2288b915909cd4d633045be9cb02bb84b948a82b958e1f8bdba200787320d23374e
-
C:\Users\Admin\AppData\Local\Temp\q.dllMD5
f48eb049482b93e280f40056ffb0617d
SHA1ba1474eed211c299ff4bd6613cc775c07212136b
SHA2563cf51f2130f7a3f4a12936b169d953ba22c7ebb04834e552a5b2d5b1ec5f1699
SHA51242fdb39a40f58565336fa5f3df6555a9dae98d52c85020cafa973aab38f9896cd94e53317ad88d268ec022e550696609e5da53ad57df7ba09b75c810508ba30e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\q.dllMD5
9ad3a0d8b2064d12a9098952c7ac3ee2
SHA1bf59513b280b6a3d4fb7bf6c5c2836fa6d5ee4a2
SHA256dd8b18f31dcfa89865629c0264283f6631d38d535b077a8afb3c55d8b677075c
SHA5127a7e152c08889e399af1e126efa3f74638d2273ffecc8e779d752052bf75e2288b915909cd4d633045be9cb02bb84b948a82b958e1f8bdba200787320d23374e
-
memory/316-120-0x0000000000000000-mapping.dmp
-
memory/324-89-0x0000000000000000-mapping.dmp
-
memory/612-118-0x0000000000000000-mapping.dmp
-
memory/732-115-0x0000000000000000-mapping.dmp
-
memory/940-111-0x0000000000000000-mapping.dmp
-
memory/948-57-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/948-67-0x0000000000250000-0x0000000000271000-memory.dmpFilesize
132KB
-
memory/948-61-0x0000000000250000-0x0000000000271000-memory.dmpFilesize
132KB
-
memory/948-62-0x0000000000250000-0x0000000000271000-memory.dmpFilesize
132KB
-
memory/948-60-0x0000000000250000-0x0000000000271000-memory.dmpFilesize
132KB
-
memory/948-59-0x0000000000250000-0x0000000000271000-memory.dmpFilesize
132KB
-
memory/948-55-0x0000000075F81000-0x0000000075F83000-memory.dmpFilesize
8KB
-
memory/948-56-0x0000000001C10000-0x0000000001D57000-memory.dmpFilesize
1.3MB
-
memory/948-58-0x0000000000210000-0x0000000000231000-memory.dmpFilesize
132KB
-
memory/948-54-0x0000000000000000-mapping.dmp
-
memory/996-121-0x0000000000000000-mapping.dmp
-
memory/1064-84-0x0000000000000000-mapping.dmp
-
memory/1064-90-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1076-105-0x0000000000000000-mapping.dmp
-
memory/1104-117-0x0000000000000000-mapping.dmp
-
memory/1132-110-0x0000000000000000-mapping.dmp
-
memory/1172-99-0x0000000000000000-mapping.dmp
-
memory/1228-88-0x0000000000000000-mapping.dmp
-
memory/1356-106-0x0000000000000000-mapping.dmp
-
memory/1408-104-0x0000000000000000-mapping.dmp
-
memory/1412-68-0x0000000000000000-mapping.dmp
-
memory/1476-66-0x0000000074791000-0x0000000074793000-memory.dmpFilesize
8KB
-
memory/1476-64-0x0000000000000000-mapping.dmp
-
memory/1476-63-0x00000000000B0000-0x00000000000B2000-memory.dmpFilesize
8KB
-
memory/1476-69-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1488-98-0x0000000000000000-mapping.dmp
-
memory/1528-97-0x0000000000000000-mapping.dmp
-
memory/1548-103-0x0000000000000000-mapping.dmp
-
memory/1664-122-0x0000000000000000-mapping.dmp
-
memory/1676-119-0x0000000000000000-mapping.dmp
-
memory/1712-107-0x0000000000000000-mapping.dmp
-
memory/1724-81-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/1724-76-0x0000000000BE0000-0x0000000000D27000-memory.dmpFilesize
1.3MB
-
memory/1724-77-0x0000000000270000-0x0000000000291000-memory.dmpFilesize
132KB
-
memory/1724-73-0x0000000000000000-mapping.dmp
-
memory/1724-79-0x0000000000270000-0x0000000000291000-memory.dmpFilesize
132KB
-
memory/1724-80-0x0000000000270000-0x0000000000291000-memory.dmpFilesize
132KB
-
memory/1724-82-0x0000000000270000-0x0000000000291000-memory.dmpFilesize
132KB
-
memory/1724-78-0x0000000000270000-0x0000000000291000-memory.dmpFilesize
132KB
-
memory/1828-112-0x0000000000000000-mapping.dmp
-
memory/1836-91-0x0000000000000000-mapping.dmp
-
memory/1884-102-0x0000000000000000-mapping.dmp
-
memory/1912-70-0x0000000000000000-mapping.dmp
-
memory/1912-71-0x000007FEFBCB1000-0x000007FEFBCB3000-memory.dmpFilesize
8KB
-
memory/1916-116-0x0000000000000000-mapping.dmp
-
memory/1920-108-0x0000000000000000-mapping.dmp
-
memory/1976-96-0x0000000000000000-mapping.dmp
-
memory/1996-113-0x0000000000000000-mapping.dmp
-
memory/2004-101-0x0000000000000000-mapping.dmp
-
memory/2040-94-0x0000000000000000-mapping.dmp