Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-01-2022 05:00
Static task
static1
Behavioral task
behavioral1
Sample
1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll
Resource
win10v2004-en-20220113
General
-
Target
1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll
-
Size
628KB
-
MD5
e3639b7a074b4349f96e9dcf59c22cde
-
SHA1
36ebed9ab3e530752a49658f76cf6c26bbebbd97
-
SHA256
1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49
-
SHA512
49042451af9bc8bc383bc9eff248447fda7c0437941a1e6f2a97276d9d9aee464045423e594084fb4865e997a7f5db82baf066244faf94e1e24f74a6cfc45083
Malware Config
Extracted
qakbot
403.10
cullinan
1640168876
93.48.80.198:995
140.82.49.12:443
32.221.229.7:443
24.152.219.253:995
31.35.28.29:443
96.37.113.36:993
190.39.205.165:443
79.173.195.234:443
39.49.66.100:995
103.139.242.30:22
79.167.192.206:995
45.9.20.200:2211
24.95.61.62:443
37.210.226.125:61202
103.139.242.30:995
70.163.1.219:443
103.143.8.71:6881
76.169.147.192:32103
136.143.11.232:443
63.153.187.104:443
24.53.49.240:443
94.200.181.154:995
149.135.101.20:443
67.209.195.198:443
209.210.95.228:32100
96.80.109.57:995
80.14.196.176:2222
38.70.253.226:2222
24.222.20.254:443
102.65.38.67:443
217.128.93.27:2222
106.51.48.170:50001
218.101.110.3:995
82.152.39.39:443
24.178.196.158:2222
74.15.2.252:2222
103.142.10.177:443
217.165.123.47:61200
89.101.97.139:443
120.150.218.241:995
117.248.109.38:21
190.73.3.148:2222
105.106.30.144:443
186.64.87.213:443
96.21.251.127:2222
111.125.245.116:995
182.176.180.73:443
188.159.111.126:443
178.153.86.181:443
31.215.70.105:443
73.151.236.31:443
121.175.104.13:32100
182.56.80.29:443
41.228.22.180:443
217.164.247.241:2222
14.96.108.245:61202
182.191.92.203:995
136.232.34.70:443
103.139.242.30:990
173.21.10.71:2222
59.6.7.83:61200
121.175.104.13:443
76.25.142.196:443
71.74.12.34:443
94.60.254.81:443
201.172.31.95:80
187.162.59.232:995
65.100.174.110:8443
100.1.119.41:443
70.51.134.181:2222
79.160.207.214:443
40.134.247.125:995
70.224.68.92:443
105.198.236.99:995
173.25.166.81:443
176.205.152.44:443
108.4.67.252:443
109.12.111.14:443
24.55.112.61:443
50.237.134.22:995
189.174.46.65:995
75.188.35.168:443
187.189.86.168:443
114.79.148.170:443
176.24.150.197:443
95.5.133.68:995
86.98.52.117:443
200.54.14.34:80
72.252.201.34:995
103.139.242.30:443
103.139.242.30:465
103.139.242.30:993
78.101.89.174:2222
78.101.89.174:443
73.5.119.219:443
23.233.146.92:443
89.137.52.44:443
74.5.148.57:443
68.186.192.69:443
50.33.112.74:995
70.93.80.154:995
75.169.58.229:32100
63.143.92.99:995
217.39.100.89:443
46.9.77.245:995
173.71.147.134:995
75.110.250.187:443
185.249.85.205:443
65.100.174.110:443
82.78.212.133:443
83.110.107.123:443
59.88.168.108:443
65.128.74.102:443
67.165.206.193:993
68.204.7.158:443
78.101.82.198:995
80.6.192.58:443
41.97.234.150:995
114.79.145.28:443
188.54.96.91:443
50.238.6.36:443
217.165.11.65:61200
103.143.8.71:995
2.178.67.97:61202
86.198.237.51:2222
88.253.171.236:995
187.172.146.123:443
92.167.4.71:2222
189.30.244.252:995
194.36.28.26:443
84.199.230.66:443
14.96.67.177:443
182.56.57.23:995
87.70.118.51:443
93.48.58.123:2222
69.46.15.180:443
23.82.128.108:443
5.36.7.212:443
200.75.131.234:443
82.77.137.101:995
187.201.90.81:443
201.172.31.95:443
216.238.72.121:443
216.238.71.31:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1608 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\4a078aa2 = b123ed99c18bb9b2196c4b7ff3badbaede9faec4aede97c39c475af96f112c69451dd3d838434e82d0223972ea4766f2414c59bd05fe9665c0e9da55b4320fba32e1f6e0dec9326ef963bf6acd5fdeaf452c414691d73f514e7f97764723e5 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\4a078aa2 = b123fa99c18b8c429e1363fdfb01c75d568c7236a9c72f8a73b3dc70bd613e470000435dc635d3691ceeab92f40c7f251c62fcf5edc3bd240439cd02b2c041d13ce53e6310ef5d54ad57 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\c5651df5 = 517dcb8b5acd74abab9368568cc4a08bf40d49c3384c14c682c66a98 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\d1351a = e871f242ef948df33152a1372cf44a741130e5bb0905d65c7d994f5cb41e6e585e7aa6af4fb21e96d551fba0c3994047fca573021d934d48e996264ad0512a2e6f831dbff6d3f18990bb7d6c764625b9e063a7e2adfe064f1570e986ca53 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\c7243d89 = 40e393653a66dd60698fa92700c483a3c8738f83058f5371156ea1fc11131fb5014050b4f3e43f71b229fbbe7462756b3769d4d5432d8846740d181adab8c429eb7e8c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\7f985aec = 971b3955a61b8a18491befddf5f517e1c20a7e12601300e1eb8c3f7b5fa19c9bb3cbebc526f0193cbb2a8b7ae12aceca1738e09f02057389ca20c0cb9fcb19be86d592a638bebd43a71b870602cf49a933cf43e92ab510c9fd22c0a7eb72b9496e09f76622ee4290f3976bde7e1eabe7883986f07ac2766e98665fabeef8c9f974dd2991d55ba933ec2fee02acac8e8c80db96e093bbe307df424bfd32f437e1622c16c5c47320f79cfdd9e29dcd1d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\7dd97a90 = 4c1a122f062d21cb99a6a16f0cded78d8e6ff5858c1284db6b66b039196192bdcecf454567a5305bf75ef6e41e6d8751e03d62e39e8cbbd1367908f42ee86b3cfe15eb13d7c8090745ce2356 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\b86d527f = 160cdfe1af2bf477a934704163dee29f6304c0d4e61e448b8a1328ded9017cc604b7d0f90a929868f84886ba9d587325728378106be2c93fc3ad1f33c221f3949de1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wzuaugpxqcd\354ee554 = b6ec1423393d7d4176eb214f34fd7bb2ac3e01e20a07a6e7aeb5bf261e3e3cf10c366998d39420fdf5bfb10a8faf6a25878b88da2dc0de4df6024fe3fbb34c84677dcac44062629b2a6658372bbc3fa36047c4f15c44ec4a3dc90b831f9d9d08f96f877713a8a8bf2b explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1308 rundll32.exe 1608 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1308 rundll32.exe 1608 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 620 wrote to memory of 1308 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1308 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1308 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1308 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1308 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1308 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 1308 620 rundll32.exe rundll32.exe PID 1308 wrote to memory of 576 1308 rundll32.exe explorer.exe PID 1308 wrote to memory of 576 1308 rundll32.exe explorer.exe PID 1308 wrote to memory of 576 1308 rundll32.exe explorer.exe PID 1308 wrote to memory of 576 1308 rundll32.exe explorer.exe PID 1308 wrote to memory of 576 1308 rundll32.exe explorer.exe PID 1308 wrote to memory of 576 1308 rundll32.exe explorer.exe PID 576 wrote to memory of 860 576 explorer.exe schtasks.exe PID 576 wrote to memory of 860 576 explorer.exe schtasks.exe PID 576 wrote to memory of 860 576 explorer.exe schtasks.exe PID 576 wrote to memory of 860 576 explorer.exe schtasks.exe PID 2000 wrote to memory of 2004 2000 taskeng.exe regsvr32.exe PID 2000 wrote to memory of 2004 2000 taskeng.exe regsvr32.exe PID 2000 wrote to memory of 2004 2000 taskeng.exe regsvr32.exe PID 2000 wrote to memory of 2004 2000 taskeng.exe regsvr32.exe PID 2000 wrote to memory of 2004 2000 taskeng.exe regsvr32.exe PID 2004 wrote to memory of 1608 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1608 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1608 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1608 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1608 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1608 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1608 2004 regsvr32.exe regsvr32.exe PID 1608 wrote to memory of 1028 1608 regsvr32.exe explorer.exe PID 1608 wrote to memory of 1028 1608 regsvr32.exe explorer.exe PID 1608 wrote to memory of 1028 1608 regsvr32.exe explorer.exe PID 1608 wrote to memory of 1028 1608 regsvr32.exe explorer.exe PID 1608 wrote to memory of 1028 1608 regsvr32.exe explorer.exe PID 1608 wrote to memory of 1028 1608 regsvr32.exe explorer.exe PID 1028 wrote to memory of 1744 1028 explorer.exe reg.exe PID 1028 wrote to memory of 1744 1028 explorer.exe reg.exe PID 1028 wrote to memory of 1744 1028 explorer.exe reg.exe PID 1028 wrote to memory of 1744 1028 explorer.exe reg.exe PID 1028 wrote to memory of 556 1028 explorer.exe reg.exe PID 1028 wrote to memory of 556 1028 explorer.exe reg.exe PID 1028 wrote to memory of 556 1028 explorer.exe reg.exe PID 1028 wrote to memory of 556 1028 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn eptybfqsm /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll\"" /SC ONCE /Z /ST 05:02 /ET 05:144⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {F43B476E-8E30-42D1-BEFA-C0C1D99BDB1B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Niwcspjgyf" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Upwpy" /d "0"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dllMD5
e3639b7a074b4349f96e9dcf59c22cde
SHA136ebed9ab3e530752a49658f76cf6c26bbebbd97
SHA2561d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49
SHA51249042451af9bc8bc383bc9eff248447fda7c0437941a1e6f2a97276d9d9aee464045423e594084fb4865e997a7f5db82baf066244faf94e1e24f74a6cfc45083
-
\Users\Admin\AppData\Local\Temp\1d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49.dllMD5
e3639b7a074b4349f96e9dcf59c22cde
SHA136ebed9ab3e530752a49658f76cf6c26bbebbd97
SHA2561d735649a27067b1397141a75e74e858c62457d05aa6be1d69b17d4e1835db49
SHA51249042451af9bc8bc383bc9eff248447fda7c0437941a1e6f2a97276d9d9aee464045423e594084fb4865e997a7f5db82baf066244faf94e1e24f74a6cfc45083
-
memory/576-61-0x00000000000F0000-0x00000000000F2000-memory.dmpFilesize
8KB
-
memory/576-63-0x00000000751E1000-0x00000000751E3000-memory.dmpFilesize
8KB
-
memory/576-64-0x00000000000C0000-0x00000000000E1000-memory.dmpFilesize
132KB
-
memory/1028-78-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1308-59-0x0000000000770000-0x00000000007B3000-memory.dmpFilesize
268KB
-
memory/1308-60-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/1308-53-0x0000000076071000-0x0000000076073000-memory.dmpFilesize
8KB
-
memory/1308-55-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/1308-58-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/1308-56-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/1308-54-0x00000000006D0000-0x0000000000770000-memory.dmpFilesize
640KB
-
memory/1308-57-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/1608-69-0x00000000001A0000-0x0000000000240000-memory.dmpFilesize
640KB
-
memory/1608-74-0x00000000009F0000-0x0000000000A11000-memory.dmpFilesize
132KB
-
memory/2004-65-0x000007FEFC511000-0x000007FEFC513000-memory.dmpFilesize
8KB