Analysis
-
max time kernel
1799s -
max time network
1802s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-01-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll
Resource
win10v2004-en-20220113
General
-
Target
24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll
-
Size
644KB
-
MD5
259bda03244a5c9077b39d0632ba829e
-
SHA1
24f1a3db1a108d35950cb15bd93dd13c4455f13b
-
SHA256
b83f24c6503b8ca75beea28f0992d819ff195463c8629bb5c69b82e6c03aa4c3
-
SHA512
f1053c863125f918accd1e2fb5211773313defc6a2dec607eca4041e73f7307058193e6291fc7c2c66125ebc3ee61e451e217148f463b7bfdcebcd3125cc05a7
Malware Config
Extracted
qakbot
403.10
cullinan
1640168876
93.48.80.198:995
140.82.49.12:443
32.221.229.7:443
24.152.219.253:995
31.35.28.29:443
96.37.113.36:993
190.39.205.165:443
79.173.195.234:443
39.49.66.100:995
103.139.242.30:22
79.167.192.206:995
45.9.20.200:2211
24.95.61.62:443
37.210.226.125:61202
103.139.242.30:995
70.163.1.219:443
103.143.8.71:6881
76.169.147.192:32103
136.143.11.232:443
63.153.187.104:443
24.53.49.240:443
94.200.181.154:995
149.135.101.20:443
67.209.195.198:443
209.210.95.228:32100
96.80.109.57:995
80.14.196.176:2222
38.70.253.226:2222
24.222.20.254:443
102.65.38.67:443
217.128.93.27:2222
106.51.48.170:50001
218.101.110.3:995
82.152.39.39:443
24.178.196.158:2222
74.15.2.252:2222
103.142.10.177:443
217.165.123.47:61200
89.101.97.139:443
120.150.218.241:995
117.248.109.38:21
190.73.3.148:2222
105.106.30.144:443
186.64.87.213:443
96.21.251.127:2222
111.125.245.116:995
182.176.180.73:443
188.159.111.126:443
178.153.86.181:443
31.215.70.105:443
73.151.236.31:443
121.175.104.13:32100
182.56.80.29:443
41.228.22.180:443
217.164.247.241:2222
14.96.108.245:61202
182.191.92.203:995
136.232.34.70:443
103.139.242.30:990
173.21.10.71:2222
59.6.7.83:61200
121.175.104.13:443
76.25.142.196:443
71.74.12.34:443
94.60.254.81:443
201.172.31.95:80
187.162.59.232:995
65.100.174.110:8443
100.1.119.41:443
70.51.134.181:2222
79.160.207.214:443
40.134.247.125:995
70.224.68.92:443
105.198.236.99:995
173.25.166.81:443
176.205.152.44:443
108.4.67.252:443
109.12.111.14:443
24.55.112.61:443
50.237.134.22:995
189.174.46.65:995
75.188.35.168:443
187.189.86.168:443
114.79.148.170:443
176.24.150.197:443
95.5.133.68:995
86.98.52.117:443
200.54.14.34:80
72.252.201.34:995
103.139.242.30:443
103.139.242.30:465
103.139.242.30:993
78.101.89.174:2222
78.101.89.174:443
73.5.119.219:443
23.233.146.92:443
89.137.52.44:443
74.5.148.57:443
68.186.192.69:443
50.33.112.74:995
70.93.80.154:995
75.169.58.229:32100
63.143.92.99:995
217.39.100.89:443
46.9.77.245:995
173.71.147.134:995
75.110.250.187:443
185.249.85.205:443
65.100.174.110:443
82.78.212.133:443
83.110.107.123:443
59.88.168.108:443
65.128.74.102:443
67.165.206.193:993
68.204.7.158:443
78.101.82.198:995
80.6.192.58:443
41.97.234.150:995
114.79.145.28:443
188.54.96.91:443
50.238.6.36:443
217.165.11.65:61200
103.143.8.71:995
2.178.67.97:61202
86.198.237.51:2222
88.253.171.236:995
187.172.146.123:443
92.167.4.71:2222
189.30.244.252:995
194.36.28.26:443
84.199.230.66:443
14.96.67.177:443
182.56.57.23:995
87.70.118.51:443
93.48.58.123:2222
69.46.15.180:443
23.82.128.108:443
5.36.7.212:443
200.75.131.234:443
82.77.137.101:995
187.201.90.81:443
201.172.31.95:443
216.238.72.121:443
216.238.71.31:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1904 regsvr32.exe -
Drops file in System32 directory 6 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 explorer.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\t4[1] explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadNetworkName = "Network 3" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-6f-aa-e9-dd-ef explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-6f-aa-e9-dd-ef\WpadDecisionReason = "1" explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-6f-aa-e9-dd-ef\WpadDetectedUrl explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\8929898e = a23142c75660344c135d9bb2d3b89db9c94170101ac59155db9492cac9a8a2bf373fc7a1d585c4596d7b85cd1e explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000005000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0169000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\c3ff3636 = 05a04852b662dd75f4559b180537ed28922c0c6a3848ba3c0ec803f3d445ab0b0b348fa2e3a9e3650cdef85864517965 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadDecisionTime = 10134f174e0dd801 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadDecisionTime = 30997b164f0dd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000009000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0169000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-6f-aa-e9-dd-ef\WpadDecisionTime = 10100de24f0dd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\8929898e = a23142c75660344c135d9bb2d3b89db9c84d73171ac59155db9492cac9a8a2bf3635c5a0d585c4596d7b85cd1e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\8929898e = a23142c75660344c135d9bb2d3b89db9c94b74131ac59155db9492cac9a8a2bf3734c1aad585c4596d7b85cd1e explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadDecisionReason = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\8929898e = a2314bc75660344c135d9af8d4b199b8ca48721454c09a50d29d91fc1571b44b07168e53 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\c6-6f-aa-e9-dd-ef explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\8929898e = a23142c75660344c135d9bb2d3b89db9c94c76131ac59155db9492cac9a8a2bf3731c6afd585c4596d7b85cd1e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadDecisionTime = 105a7430500dd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\7b435153 = 8cec12cb3305e3c2237681019689611c418b41c7a98ce15e4bf90ab7ab088eb28b25cd7f624d779b2816c96780112bb57afe4c05e356be6cb617c2778cf53f4bdfc93a7f76cdde4fc30bc9d98a6b98171fb846110f809a2032a6ed56b95930cebdd940243de054c9b8078c140f3f8a explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\40a3ea5 = 5e8792a01cf20ef3d2f3dac5d9c99169bd35b94543954f57 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-6f-aa-e9-dd-ef\WpadDecisionTime = d04156e44e0dd801 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000008000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0169000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-6f-aa-e9-dd-ef\WpadDecisionTime = f0232d564f0dd801 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Zlnyayinswvmtm explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadDecisionTime = f0f3dc404e0dd801 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadDecisionTime = d04156e44e0dd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8494497A-BFBF-494C-89FC-B6E42562246F}\WpadDecisionTime = 90c381c14f0dd801 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 460000000b000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0169000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\8929898e = a2315cc75660019fc9466e8cf7f561 explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Zlnyayinswvmtm\f660e678 = a492e519dbe5342ddb1b5bc68403ee82b494d33df05bec27c03f784d91648824cc91dd24fe9f85a1f5f959b917e705a6a8d95a58fb3c1ec2eea55ea2 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-6f-aa-e9-dd-ef\WpadDecision = "0" explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1096 rundll32.exe 1904 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1096 rundll32.exe 1904 regsvr32.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exetaskeng.exeregsvr32.exedescription pid process target process PID 1724 wrote to memory of 1096 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1096 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1096 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1096 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1096 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1096 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1096 1724 rundll32.exe rundll32.exe PID 1096 wrote to memory of 268 1096 rundll32.exe explorer.exe PID 1096 wrote to memory of 268 1096 rundll32.exe explorer.exe PID 1096 wrote to memory of 268 1096 rundll32.exe explorer.exe PID 1096 wrote to memory of 268 1096 rundll32.exe explorer.exe PID 1096 wrote to memory of 268 1096 rundll32.exe explorer.exe PID 1096 wrote to memory of 268 1096 rundll32.exe explorer.exe PID 268 wrote to memory of 1380 268 explorer.exe schtasks.exe PID 268 wrote to memory of 1380 268 explorer.exe schtasks.exe PID 268 wrote to memory of 1380 268 explorer.exe schtasks.exe PID 268 wrote to memory of 1380 268 explorer.exe schtasks.exe PID 1768 wrote to memory of 1060 1768 taskeng.exe regsvr32.exe PID 1768 wrote to memory of 1060 1768 taskeng.exe regsvr32.exe PID 1768 wrote to memory of 1060 1768 taskeng.exe regsvr32.exe PID 1768 wrote to memory of 1060 1768 taskeng.exe regsvr32.exe PID 1768 wrote to memory of 1060 1768 taskeng.exe regsvr32.exe PID 1060 wrote to memory of 1904 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1904 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1904 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1904 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1904 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1904 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1904 1060 regsvr32.exe regsvr32.exe PID 1904 wrote to memory of 2028 1904 regsvr32.exe explorer.exe PID 1904 wrote to memory of 2028 1904 regsvr32.exe explorer.exe PID 1904 wrote to memory of 2028 1904 regsvr32.exe explorer.exe PID 1904 wrote to memory of 2028 1904 regsvr32.exe explorer.exe PID 1904 wrote to memory of 2028 1904 regsvr32.exe explorer.exe PID 1904 wrote to memory of 2028 1904 regsvr32.exe explorer.exe PID 2028 wrote to memory of 1748 2028 explorer.exe reg.exe PID 2028 wrote to memory of 1748 2028 explorer.exe reg.exe PID 2028 wrote to memory of 1748 2028 explorer.exe reg.exe PID 2028 wrote to memory of 1748 2028 explorer.exe reg.exe PID 2028 wrote to memory of 1604 2028 explorer.exe reg.exe PID 2028 wrote to memory of 1604 2028 explorer.exe reg.exe PID 2028 wrote to memory of 1604 2028 explorer.exe reg.exe PID 2028 wrote to memory of 1604 2028 explorer.exe reg.exe PID 1248 wrote to memory of 1744 1248 taskeng.exe regsvr32.exe PID 1248 wrote to memory of 1744 1248 taskeng.exe regsvr32.exe PID 1248 wrote to memory of 1744 1248 taskeng.exe regsvr32.exe PID 1248 wrote to memory of 1744 1248 taskeng.exe regsvr32.exe PID 1248 wrote to memory of 1744 1248 taskeng.exe regsvr32.exe PID 1744 wrote to memory of 1152 1744 regsvr32.exe regsvr32.exe PID 1744 wrote to memory of 1152 1744 regsvr32.exe regsvr32.exe PID 1744 wrote to memory of 1152 1744 regsvr32.exe regsvr32.exe PID 1744 wrote to memory of 1152 1744 regsvr32.exe regsvr32.exe PID 1744 wrote to memory of 1152 1744 regsvr32.exe regsvr32.exe PID 1744 wrote to memory of 1152 1744 regsvr32.exe regsvr32.exe PID 1744 wrote to memory of 1152 1744 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ruebdwp /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll\"" /SC ONCE /Z /ST 15:57 /ET 16:094⤵
- Creates scheduled task(s)
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {385BA619-4781-4352-AC20-4820469A6780} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Fxeycgzg" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Vyqifkzufa" /d "0"5⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {510DEE15-411D-4535-957B-EF59B731E8AE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dll"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dllMD5
259bda03244a5c9077b39d0632ba829e
SHA124f1a3db1a108d35950cb15bd93dd13c4455f13b
SHA256b83f24c6503b8ca75beea28f0992d819ff195463c8629bb5c69b82e6c03aa4c3
SHA512f1053c863125f918accd1e2fb5211773313defc6a2dec607eca4041e73f7307058193e6291fc7c2c66125ebc3ee61e451e217148f463b7bfdcebcd3125cc05a7
-
C:\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dllMD5
01b8a974f93befd9725b5f7f5b27e029
SHA191eca55d0a72e1fa3e4d28df748f029da44dc03c
SHA25690a59ab0372737c3d1536ed00213d96cd23f1fd5209843f1d2539fb493da588c
SHA5122d2a1a254e4628fe1ddd15b63f16896033430f6fb9631dee1f76f51acfe00ae35e4c67f57af82770d33acf6454fe88ef58cad0c228f978b4f3791f6a2fa10d30
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\24f1a3db1a108d35950cb15bd93dd13c4455f13b.dllMD5
259bda03244a5c9077b39d0632ba829e
SHA124f1a3db1a108d35950cb15bd93dd13c4455f13b
SHA256b83f24c6503b8ca75beea28f0992d819ff195463c8629bb5c69b82e6c03aa4c3
SHA512f1053c863125f918accd1e2fb5211773313defc6a2dec607eca4041e73f7307058193e6291fc7c2c66125ebc3ee61e451e217148f463b7bfdcebcd3125cc05a7
-
memory/268-62-0x0000000000080000-0x0000000000082000-memory.dmpFilesize
8KB
-
memory/268-65-0x00000000000D0000-0x00000000000F1000-memory.dmpFilesize
132KB
-
memory/268-64-0x0000000075121000-0x0000000075123000-memory.dmpFilesize
8KB
-
memory/824-66-0x000007FEFC451000-0x000007FEFC453000-memory.dmpFilesize
8KB
-
memory/1096-60-0x0000000000410000-0x0000000000431000-memory.dmpFilesize
132KB
-
memory/1096-56-0x00000000003C0000-0x0000000000403000-memory.dmpFilesize
268KB
-
memory/1096-54-0x0000000076491000-0x0000000076493000-memory.dmpFilesize
8KB
-
memory/1096-59-0x0000000000410000-0x0000000000431000-memory.dmpFilesize
132KB
-
memory/1096-58-0x0000000000410000-0x0000000000431000-memory.dmpFilesize
132KB
-
memory/1096-57-0x0000000000410000-0x0000000000431000-memory.dmpFilesize
132KB
-
memory/1096-55-0x00000000001F0000-0x0000000000290000-memory.dmpFilesize
640KB
-
memory/1096-61-0x0000000000410000-0x0000000000431000-memory.dmpFilesize
132KB
-
memory/1904-73-0x00000000004D0000-0x00000000004F1000-memory.dmpFilesize
132KB
-
memory/1904-75-0x00000000004D0000-0x00000000004F1000-memory.dmpFilesize
132KB
-
memory/1904-74-0x00000000004D0000-0x00000000004F1000-memory.dmpFilesize
132KB
-
memory/1904-72-0x00000000004D0000-0x00000000004F1000-memory.dmpFilesize
132KB
-
memory/1904-81-0x00000000004D0000-0x00000000004F1000-memory.dmpFilesize
132KB
-
memory/1904-80-0x0000000000390000-0x00000000003D3000-memory.dmpFilesize
268KB
-
memory/1904-71-0x0000000000430000-0x00000000004D0000-memory.dmpFilesize
640KB
-
memory/2028-82-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB