Resubmissions
19-01-2022 09:52
220119-lv9resghbm 1018-01-2022 12:03
220118-n8f3dabad3 1018-01-2022 11:55
220118-n3rxpabab6 10Analysis
-
max time kernel
1787s -
max time network
1789s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
18-01-2022 12:03
Static task
static1
Behavioral task
behavioral1
Sample
dexc.ocx.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dexc.ocx.dll
Resource
win10v2004-en-20220113
General
-
Target
dexc.ocx.dll
-
Size
647KB
-
MD5
74335b83254eeff621dd7bea844eb859
-
SHA1
b004da994afd349eec84ef0a579ca9785f6f496d
-
SHA256
5f04c44de516e644115ad8094afbdab4b52ce6e46a848aeb7cf634ad471e4ac0
-
SHA512
edece82d4cb1a8c8d7f5d43ffa7920ff0cb8c61154c5b06d9b3d48a52b0a08a4ce0c0610957d1ca4d5ae6d99e4a4f441da3a2a56eec3e123666742c59905c44e
Malware Config
Extracted
qakbot
403.10
cullinan
1640168876
93.48.80.198:995
140.82.49.12:443
32.221.229.7:443
24.152.219.253:995
31.35.28.29:443
96.37.113.36:993
190.39.205.165:443
79.173.195.234:443
39.49.66.100:995
103.139.242.30:22
79.167.192.206:995
45.9.20.200:2211
24.95.61.62:443
37.210.226.125:61202
103.139.242.30:995
70.163.1.219:443
103.143.8.71:6881
76.169.147.192:32103
136.143.11.232:443
63.153.187.104:443
24.53.49.240:443
94.200.181.154:995
149.135.101.20:443
67.209.195.198:443
209.210.95.228:32100
96.80.109.57:995
80.14.196.176:2222
38.70.253.226:2222
24.222.20.254:443
102.65.38.67:443
217.128.93.27:2222
106.51.48.170:50001
218.101.110.3:995
82.152.39.39:443
24.178.196.158:2222
74.15.2.252:2222
103.142.10.177:443
217.165.123.47:61200
89.101.97.139:443
120.150.218.241:995
117.248.109.38:21
190.73.3.148:2222
105.106.30.144:443
186.64.87.213:443
96.21.251.127:2222
111.125.245.116:995
182.176.180.73:443
188.159.111.126:443
178.153.86.181:443
31.215.70.105:443
73.151.236.31:443
121.175.104.13:32100
182.56.80.29:443
41.228.22.180:443
217.164.247.241:2222
14.96.108.245:61202
182.191.92.203:995
136.232.34.70:443
103.139.242.30:990
173.21.10.71:2222
59.6.7.83:61200
121.175.104.13:443
76.25.142.196:443
71.74.12.34:443
94.60.254.81:443
201.172.31.95:80
187.162.59.232:995
65.100.174.110:8443
100.1.119.41:443
70.51.134.181:2222
79.160.207.214:443
40.134.247.125:995
70.224.68.92:443
105.198.236.99:995
173.25.166.81:443
176.205.152.44:443
108.4.67.252:443
109.12.111.14:443
24.55.112.61:443
50.237.134.22:995
189.174.46.65:995
75.188.35.168:443
187.189.86.168:443
114.79.148.170:443
176.24.150.197:443
95.5.133.68:995
86.98.52.117:443
200.54.14.34:80
72.252.201.34:995
103.139.242.30:443
103.139.242.30:465
103.139.242.30:993
78.101.89.174:2222
78.101.89.174:443
73.5.119.219:443
23.233.146.92:443
89.137.52.44:443
74.5.148.57:443
68.186.192.69:443
50.33.112.74:995
70.93.80.154:995
75.169.58.229:32100
63.143.92.99:995
217.39.100.89:443
46.9.77.245:995
173.71.147.134:995
75.110.250.187:443
185.249.85.205:443
65.100.174.110:443
82.78.212.133:443
83.110.107.123:443
59.88.168.108:443
65.128.74.102:443
67.165.206.193:993
68.204.7.158:443
78.101.82.198:995
80.6.192.58:443
41.97.234.150:995
114.79.145.28:443
188.54.96.91:443
50.238.6.36:443
217.165.11.65:61200
103.143.8.71:995
2.178.67.97:61202
86.198.237.51:2222
88.253.171.236:995
187.172.146.123:443
92.167.4.71:2222
189.30.244.252:995
194.36.28.26:443
84.199.230.66:443
14.96.67.177:443
182.56.57.23:995
87.70.118.51:443
93.48.58.123:2222
69.46.15.180:443
23.82.128.108:443
5.36.7.212:443
200.75.131.234:443
82.77.137.101:995
187.201.90.81:443
201.172.31.95:443
216.238.72.121:443
216.238.71.31:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1604 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
netstat.exeipconfig.exepid process 1140 netstat.exe 956 ipconfig.exe -
Modifies data under HKEY_USERS 58 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\79bc977e = 358aa4b72a91a31fd3058c0012bf961235988e740df72b5525b0ab841db7566f46ba90e7296a57fc20f4fbac9bf1e7dce3c4a23896b6abbf8e152c5e2799e1287449c7358f630e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\bc08bf91 = 16a4f28ef256289fadf5d2d3098824ce9827e4b24af7fc4b0277b5548b4aa30a6ade435b813c623fcbaf9a76e9fb4b81a96b36df1d6dbe1f5ee1e70753633d5d02bd63c46e4da3f912 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\c341d067 = 1781189140c6448bb48d958f845668a6a9f72fb73c8667b4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965ede184346b21def7b1d227fa8814c77ab32887a1cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000005000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965eee587306b21def7b1d227fa8814c77ab02e85a0cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadDecisionTime = 903d19c46e0cd801 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDecision = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965eee587306b21def7b1d227fa8814c77ab02c84a6cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDecisionTime = b066d6266f0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5faf77c20f772c0295c7c922e97842f557862bee16e97e8990aee9485b529e8479461be15a2ed0002a6109d05d6afbe3134ae5d3136b6658bc09ee804425 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\7bfdb702 = 8077f3e7c721b2be8909492a4eb8da9a73d5210b06492d4a0a83ac572a8f4cbe740659cca3a700e35c02064e10b361eadc3b0129978a32eadef1c72266d1894a12d7cb57a2cf0f73417df1450412c1bfeb7e23404082f8af37cf658645d870617a6659125d21d36565556492a1e483d697affd8f489ff7186dc9ee1b23b1999b2fba111d14a3e646d6f43d5352830a1ee8dcbdefc6b4248ae4b70cdf42cf244260bafa10633356bdd1fc6274812e1c26f82f408253e25eda42021fb3a72ce49304dc3ba570de509d72 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965edec86376b21def7b1d227fa8814c77ab32887a1cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDecisionTime = b0c94d126d0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000006000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E} explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDecisionTime = 107a6dc36d0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadDecisionTime = b0c94d126d0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965eee089306b21def7b1d227fa8814c77ab0298ca5cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadDecisionReason = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadDecisionTime = d0fd12626d0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDecisionReason = "1" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadDecisionTime = 107a6dc36d0cd801 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadDecision = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\76-bb-a2-f5-7a-5b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDecisionTime = 903d19c46e0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4b4d8f4 = c101d7b23bac597f6574c0948e0d083da7837f7f0b62b5cd9026e67ddb867998bb3e733ee1e3bf01c77d0a59 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\312b08ba = d342685048d7e3dbff39f5268fbb261c00ccc4c22e8a6d1c892a74b5e5b901f243d5c27cb61e1ecc25c74ce12e491ed30163d4f225529e077ed7e17a206cc32ad96391e0fabe17ef6427c58b820a6e43abee29e6498456 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDetectedUrl explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb877c20f42d32fafb4ad93190e65e7e586332527d4f4b3dc27cc783af3089a9d7fd7dc21ad7b49653cc9f1c885e57b9b80f6aaa701d246c8e96b556d43b6b9ea6dca8f3df4e93ee9f235af192a1fddbf99cd explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadDecisionTime = b066d6266f0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965eeec81336b21def7b1d227fa8814c77ab0298ca5cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb877c20f42d32fafb4ad93190e65e7e586332527d4f4b1df24cc783af3089a9d7fd7dc21ad7b49653cc9f1c885e57b9b80f6aaa701d246c8e96b556d43b6b9ea6dca8f3df4e93ee9f235af192a1fddbf99cd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965ede184346b21def7b1d227fa8814c77ab32a80a0cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4ED54F9-84E2-431E-AC4D-FE3E6504718E}\WpadNetworkName = "Network 3" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965edec86376b21def7b1d227fa8814c77ab32686a7cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965edec86376b21def7b1d227fa8814c77ab02e85a0cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000007000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ovgsjiuocxix explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\c100f01b = e4b590457b67d667e29de7adaba7cd3ad0cdd6a33613b51719dc79388e78 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-bb-a2-f5-7a-5b\WpadDecisionTime = d0fd12626d0cd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Ovgsjiuocxix\4e62674c = bc5fb177c20f42d32fafb5e794100965eee089306b21def7b1d227fa8814c77ab02b8da4cacc324c2684ba0e0ed7d5de68430452731a6e5976c64f1668ddf38987f8da0e291dede8d489daa57f29c8d1ef4479afe560cc2d7007e9ce40 explorer.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
rundll32.exeregsvr32.exeexplorer.exepid process 1300 rundll32.exe 1604 regsvr32.exe 1224 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1300 rundll32.exe 1604 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
whoami.exenetstat.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1616 whoami.exe Token: SeDebugPrivilege 1140 netstat.exe Token: SeRestorePrivilege 1392 msiexec.exe Token: SeTakeOwnershipPrivilege 1392 msiexec.exe Token: SeSecurityPrivilege 1392 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exetaskeng.exeregsvr32.exedescription pid process target process PID 812 wrote to memory of 1300 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 1300 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 1300 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 1300 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 1300 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 1300 812 rundll32.exe rundll32.exe PID 812 wrote to memory of 1300 812 rundll32.exe rundll32.exe PID 1300 wrote to memory of 1224 1300 rundll32.exe explorer.exe PID 1300 wrote to memory of 1224 1300 rundll32.exe explorer.exe PID 1300 wrote to memory of 1224 1300 rundll32.exe explorer.exe PID 1300 wrote to memory of 1224 1300 rundll32.exe explorer.exe PID 1300 wrote to memory of 1224 1300 rundll32.exe explorer.exe PID 1300 wrote to memory of 1224 1300 rundll32.exe explorer.exe PID 1224 wrote to memory of 612 1224 explorer.exe schtasks.exe PID 1224 wrote to memory of 612 1224 explorer.exe schtasks.exe PID 1224 wrote to memory of 612 1224 explorer.exe schtasks.exe PID 1224 wrote to memory of 612 1224 explorer.exe schtasks.exe PID 1892 wrote to memory of 1188 1892 taskeng.exe regsvr32.exe PID 1892 wrote to memory of 1188 1892 taskeng.exe regsvr32.exe PID 1892 wrote to memory of 1188 1892 taskeng.exe regsvr32.exe PID 1892 wrote to memory of 1188 1892 taskeng.exe regsvr32.exe PID 1892 wrote to memory of 1188 1892 taskeng.exe regsvr32.exe PID 1188 wrote to memory of 1604 1188 regsvr32.exe regsvr32.exe PID 1188 wrote to memory of 1604 1188 regsvr32.exe regsvr32.exe PID 1188 wrote to memory of 1604 1188 regsvr32.exe regsvr32.exe PID 1188 wrote to memory of 1604 1188 regsvr32.exe regsvr32.exe PID 1188 wrote to memory of 1604 1188 regsvr32.exe regsvr32.exe PID 1188 wrote to memory of 1604 1188 regsvr32.exe regsvr32.exe PID 1188 wrote to memory of 1604 1188 regsvr32.exe regsvr32.exe PID 1604 wrote to memory of 1980 1604 regsvr32.exe explorer.exe PID 1604 wrote to memory of 1980 1604 regsvr32.exe explorer.exe PID 1604 wrote to memory of 1980 1604 regsvr32.exe explorer.exe PID 1604 wrote to memory of 1980 1604 regsvr32.exe explorer.exe PID 1604 wrote to memory of 1980 1604 regsvr32.exe explorer.exe PID 1604 wrote to memory of 1980 1604 regsvr32.exe explorer.exe PID 1980 wrote to memory of 1704 1980 explorer.exe reg.exe PID 1980 wrote to memory of 1704 1980 explorer.exe reg.exe PID 1980 wrote to memory of 1704 1980 explorer.exe reg.exe PID 1980 wrote to memory of 1704 1980 explorer.exe reg.exe PID 1980 wrote to memory of 296 1980 explorer.exe reg.exe PID 1980 wrote to memory of 296 1980 explorer.exe reg.exe PID 1980 wrote to memory of 296 1980 explorer.exe reg.exe PID 1980 wrote to memory of 296 1980 explorer.exe reg.exe PID 2044 wrote to memory of 1288 2044 taskeng.exe regsvr32.exe PID 2044 wrote to memory of 1288 2044 taskeng.exe regsvr32.exe PID 2044 wrote to memory of 1288 2044 taskeng.exe regsvr32.exe PID 2044 wrote to memory of 1288 2044 taskeng.exe regsvr32.exe PID 2044 wrote to memory of 1288 2044 taskeng.exe regsvr32.exe PID 1288 wrote to memory of 604 1288 regsvr32.exe regsvr32.exe PID 1288 wrote to memory of 604 1288 regsvr32.exe regsvr32.exe PID 1288 wrote to memory of 604 1288 regsvr32.exe regsvr32.exe PID 1288 wrote to memory of 604 1288 regsvr32.exe regsvr32.exe PID 1288 wrote to memory of 604 1288 regsvr32.exe regsvr32.exe PID 1288 wrote to memory of 604 1288 regsvr32.exe regsvr32.exe PID 1288 wrote to memory of 604 1288 regsvr32.exe regsvr32.exe PID 1224 wrote to memory of 1616 1224 explorer.exe whoami.exe PID 1224 wrote to memory of 1616 1224 explorer.exe whoami.exe PID 1224 wrote to memory of 1616 1224 explorer.exe whoami.exe PID 1224 wrote to memory of 1616 1224 explorer.exe whoami.exe PID 1224 wrote to memory of 844 1224 explorer.exe cmd.exe PID 1224 wrote to memory of 844 1224 explorer.exe cmd.exe PID 1224 wrote to memory of 844 1224 explorer.exe cmd.exe PID 1224 wrote to memory of 844 1224 explorer.exe cmd.exe PID 1224 wrote to memory of 1632 1224 explorer.exe arp.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ypldadymdy /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dll\"" /SC ONCE /Z /ST 13:06 /ET 13:184⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\whoami.exewhoami /all4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c set4⤵
-
C:\Windows\SysWOW64\arp.exearp -a4⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
-
C:\Windows\SysWOW64\net.exenet view /all4⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\nslookup.exenslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP4⤵
-
C:\Windows\SysWOW64\net.exenet share4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share5⤵
-
C:\Windows\SysWOW64\route.exeroute print4⤵
-
C:\Windows\SysWOW64\netstat.exenetstat -nao4⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exenet localgroup4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup5⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {8A06EE01-DE2A-42BB-A039-14CFD93BBBA8} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Aauboaxhjyry" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ybgqonel" /d "0"5⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {7EEE34D2-1A9B-44E4-92B9-F3B1EB7243F6} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dll"3⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dllMD5
74335b83254eeff621dd7bea844eb859
SHA1b004da994afd349eec84ef0a579ca9785f6f496d
SHA2565f04c44de516e644115ad8094afbdab4b52ce6e46a848aeb7cf634ad471e4ac0
SHA512edece82d4cb1a8c8d7f5d43ffa7920ff0cb8c61154c5b06d9b3d48a52b0a08a4ce0c0610957d1ca4d5ae6d99e4a4f441da3a2a56eec3e123666742c59905c44e
-
C:\Users\Admin\AppData\Local\Temp\dexc.ocx.dllMD5
01b8a974f93befd9725b5f7f5b27e029
SHA191eca55d0a72e1fa3e4d28df748f029da44dc03c
SHA25690a59ab0372737c3d1536ed00213d96cd23f1fd5209843f1d2539fb493da588c
SHA5122d2a1a254e4628fe1ddd15b63f16896033430f6fb9631dee1f76f51acfe00ae35e4c67f57af82770d33acf6454fe88ef58cad0c228f978b4f3791f6a2fa10d30
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\dexc.ocx.dllMD5
74335b83254eeff621dd7bea844eb859
SHA1b004da994afd349eec84ef0a579ca9785f6f496d
SHA2565f04c44de516e644115ad8094afbdab4b52ce6e46a848aeb7cf634ad471e4ac0
SHA512edece82d4cb1a8c8d7f5d43ffa7920ff0cb8c61154c5b06d9b3d48a52b0a08a4ce0c0610957d1ca4d5ae6d99e4a4f441da3a2a56eec3e123666742c59905c44e
-
memory/1188-67-0x000007FEFB5B1000-0x000007FEFB5B3000-memory.dmpFilesize
8KB
-
memory/1224-63-0x00000000000B0000-0x00000000000B2000-memory.dmpFilesize
8KB
-
memory/1224-66-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1224-65-0x0000000074281000-0x0000000074283000-memory.dmpFilesize
8KB
-
memory/1300-61-0x0000000000240000-0x0000000000283000-memory.dmpFilesize
268KB
-
memory/1300-58-0x0000000000290000-0x00000000002B1000-memory.dmpFilesize
132KB
-
memory/1300-55-0x0000000075AB1000-0x0000000075AB3000-memory.dmpFilesize
8KB
-
memory/1300-59-0x0000000000290000-0x00000000002B1000-memory.dmpFilesize
132KB
-
memory/1300-60-0x0000000000290000-0x00000000002B1000-memory.dmpFilesize
132KB
-
memory/1300-57-0x0000000000290000-0x00000000002B1000-memory.dmpFilesize
132KB
-
memory/1300-56-0x00000000002E0000-0x0000000000380000-memory.dmpFilesize
640KB
-
memory/1300-62-0x0000000000290000-0x00000000002B1000-memory.dmpFilesize
132KB
-
memory/1604-73-0x00000000005B0000-0x00000000005D1000-memory.dmpFilesize
132KB
-
memory/1604-75-0x00000000005B0000-0x00000000005D1000-memory.dmpFilesize
132KB
-
memory/1604-74-0x00000000005B0000-0x00000000005D1000-memory.dmpFilesize
132KB
-
memory/1604-72-0x00000000005B0000-0x00000000005D1000-memory.dmpFilesize
132KB
-
memory/1604-81-0x00000000005B0000-0x00000000005D1000-memory.dmpFilesize
132KB
-
memory/1604-80-0x0000000000560000-0x00000000005A3000-memory.dmpFilesize
268KB
-
memory/1604-71-0x00000000002F0000-0x0000000000390000-memory.dmpFilesize
640KB
-
memory/1980-82-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB