Analysis
-
max time kernel
133s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dll
Resource
win7-en-20211208
General
-
Target
d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dll
-
Size
1.6MB
-
MD5
9e07c7734ebe26f50037757a577a9cfc
-
SHA1
6ecf7db4b483922559ce0f7000cf47e46b0a97e8
-
SHA256
d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d
-
SHA512
8d881a7d82f6e9c8de009ac4aeb5dd2480f49ff999f8a3f34dc6ac92ac279e247e0d1a22b6c6769a03f5db6758db1cb7cbaaf0ee6cbbaf65ddc6f56acbf399d6
Malware Config
Extracted
qakbot
403.10
obama152
1643038242
67.209.195.198:443
75.156.151.34:443
89.101.97.139:443
23.229.117.237:443
45.9.20.200:443
70.45.174.173:443
140.82.49.12:443
86.98.47.119:61200
96.246.158.154:995
185.249.85.209:443
89.114.156.182:995
92.99.167.144:2078
136.143.11.232:443
190.73.3.148:2222
78.101.147.76:61202
37.210.172.200:2222
82.152.39.39:443
70.51.153.245:2222
103.143.8.71:6881
39.49.110.129:995
65.100.174.110:443
86.97.246.244:1194
65.100.174.110:995
182.56.120.13:443
31.215.99.178:443
94.59.253.222:2222
108.4.67.252:443
37.203.225.248:443
217.128.93.27:2222
100.1.119.41:443
86.97.246.244:2222
94.200.181.154:995
182.191.92.203:995
24.95.61.62:443
70.163.1.219:443
69.14.172.24:443
200.75.131.234:443
24.178.196.158:2222
187.189.86.168:443
40.134.247.125:995
149.135.101.20:443
38.70.253.226:2222
24.222.20.254:443
83.110.2.97:443
86.108.46.251:443
74.15.2.252:2222
102.65.38.67:443
96.80.109.57:995
209.210.95.228:32100
180.233.150.134:995
31.215.69.82:443
75.139.7.190:2083
24.53.49.240:443
80.14.196.176:2222
86.98.32.228:443
94.60.254.81:443
130.164.129.3:443
176.67.56.94:443
31.167.160.170:443
31.35.28.29:443
32.221.231.1:443
96.21.251.127:2222
173.21.10.71:2222
72.252.201.34:995
41.86.42.158:995
41.228.22.180:443
93.48.80.198:995
111.125.245.116:995
117.248.109.38:21
103.142.10.177:443
68.204.7.158:443
144.86.28.125:443
120.150.218.241:995
89.137.52.44:443
220.255.25.1:2222
103.139.242.30:993
78.87.44.54:995
71.74.12.34:443
128.106.122.39:443
31.215.226.115:2222
76.25.142.196:443
142.186.63.108:2222
60.54.102.15:443
73.151.236.31:443
73.136.32.202:443
5.32.41.46:443
78.180.191.206:995
109.12.111.14:443
80.6.192.58:443
63.143.92.99:995
27.5.4.194:2078
86.133.23.70:443
116.86.26.140:995
90.8.56.248:2222
101.50.120.112:995
67.165.206.193:993
31.215.29.238:443
186.64.87.231:443
190.206.211.182:443
218.101.110.3:995
103.139.242.30:990
136.232.34.70:443
73.67.152.98:2222
47.158.25.67:443
72.252.201.34:990
72.252.201.34:993
217.165.109.189:32101
114.79.148.170:443
197.89.105.165:443
182.176.180.73:443
75.188.35.168:443
27.223.92.142:995
71.163.110.53:995
75.168.192.223:2222
107.77.232.51:443
201.172.31.135:80
83.110.98.231:995
96.37.113.36:993
78.191.27.236:995
78.96.235.245:443
91.185.131.89:61202
76.169.147.192:32103
114.143.84.25:61202
92.98.33.251:995
23.233.146.92:443
75.169.58.229:32100
184.100.174.73:443
50.237.134.22:995
36.234.184.238:995
65.100.174.110:8443
59.12.216.39:443
103.139.242.30:22
190.45.79.111:443
176.24.150.197:443
106.51.48.170:50001
111.119.252.178:995
73.59.201.174:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 868 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\6bd96740 = bdcdf63626ec5323fb2e6b14d97c8ae1905241dcb100c7c0187496451426698c708bc887757f2dee7121eace4e30d559cdc07f5b7045a1f0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\5e46b70e = 3ae144585e3e83d05d578815d019a8e051fc6e746ab42c2612523d53e7dfc99ecd324352db795a3e8727bcfb3fcbad43ca8346815f76b907fa60b93f957902ab6eee8485acda48a78109d992df282c655d4e0a7ffbbb2dcec07cf646d6388961eb8f44bad9d864c176d5fd34 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\5c079772 = 7e16d1fb1a24f248388e2be10817790483245bd89312cf894f8cc00ac3f6c1fb101192ce98b74b1317b3ce8f593ee1db82ed6285be2136431f4bb4dcc2bb5c212ee8daac03d28a2e515561f7b094abf6af692dd9c1137d91f11ea726ea8082dd23e5b805c9c08a8491ff explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\210fd8f8 = 7eff23010fc6fa6b1838065d6e097bd5480d7116bde0e27f0831 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\e6fad06b = 0b64a274b15c98bb1316fd9657e248b4b451c4f49e65e8771d40b940a538 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\6bd96740 = bdcde13626ec6628d006f876561e3b067749be28ed54a931bf2aa5eea16e615267b99c864624155cb6021ab0e9a085137be0994b87deffbfea299a88228e649bdf9ba28e0c87d9f4845778cf92 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\e4bbf017 = a88e36a0c4eda3e7b283ebc90c6d94aa569cd8d3e8ef4c57fbe69b6d8b54923a8deb72b7a5526b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\99b3bf9d = d1081ece0bda4fca9750e533c8058fe374574074eb4be4b125fcba3fb3b2892cae61aec2e791e0588604798f8eecb7b0afbbf96444c2c0889f06a94134fc9167719079f68931caa32ae94848483c5a1136b7c686107a1039857ef44a389ed7bd8a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ulraiij\149008b6 = 28c246b88e26d57439d68f2ec0b2fd509cb8ffb53d45 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1732 rundll32.exe 868 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1732 rundll32.exe 868 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1492 wrote to memory of 1732 1492 rundll32.exe rundll32.exe PID 1492 wrote to memory of 1732 1492 rundll32.exe rundll32.exe PID 1492 wrote to memory of 1732 1492 rundll32.exe rundll32.exe PID 1492 wrote to memory of 1732 1492 rundll32.exe rundll32.exe PID 1492 wrote to memory of 1732 1492 rundll32.exe rundll32.exe PID 1492 wrote to memory of 1732 1492 rundll32.exe rundll32.exe PID 1492 wrote to memory of 1732 1492 rundll32.exe rundll32.exe PID 1732 wrote to memory of 552 1732 rundll32.exe explorer.exe PID 1732 wrote to memory of 552 1732 rundll32.exe explorer.exe PID 1732 wrote to memory of 552 1732 rundll32.exe explorer.exe PID 1732 wrote to memory of 552 1732 rundll32.exe explorer.exe PID 1732 wrote to memory of 552 1732 rundll32.exe explorer.exe PID 1732 wrote to memory of 552 1732 rundll32.exe explorer.exe PID 552 wrote to memory of 1652 552 explorer.exe schtasks.exe PID 552 wrote to memory of 1652 552 explorer.exe schtasks.exe PID 552 wrote to memory of 1652 552 explorer.exe schtasks.exe PID 552 wrote to memory of 1652 552 explorer.exe schtasks.exe PID 620 wrote to memory of 1000 620 taskeng.exe regsvr32.exe PID 620 wrote to memory of 1000 620 taskeng.exe regsvr32.exe PID 620 wrote to memory of 1000 620 taskeng.exe regsvr32.exe PID 620 wrote to memory of 1000 620 taskeng.exe regsvr32.exe PID 620 wrote to memory of 1000 620 taskeng.exe regsvr32.exe PID 1000 wrote to memory of 868 1000 regsvr32.exe regsvr32.exe PID 1000 wrote to memory of 868 1000 regsvr32.exe regsvr32.exe PID 1000 wrote to memory of 868 1000 regsvr32.exe regsvr32.exe PID 1000 wrote to memory of 868 1000 regsvr32.exe regsvr32.exe PID 1000 wrote to memory of 868 1000 regsvr32.exe regsvr32.exe PID 1000 wrote to memory of 868 1000 regsvr32.exe regsvr32.exe PID 1000 wrote to memory of 868 1000 regsvr32.exe regsvr32.exe PID 868 wrote to memory of 1784 868 regsvr32.exe explorer.exe PID 868 wrote to memory of 1784 868 regsvr32.exe explorer.exe PID 868 wrote to memory of 1784 868 regsvr32.exe explorer.exe PID 868 wrote to memory of 1784 868 regsvr32.exe explorer.exe PID 868 wrote to memory of 1784 868 regsvr32.exe explorer.exe PID 868 wrote to memory of 1784 868 regsvr32.exe explorer.exe PID 1784 wrote to memory of 1252 1784 explorer.exe reg.exe PID 1784 wrote to memory of 1252 1784 explorer.exe reg.exe PID 1784 wrote to memory of 1252 1784 explorer.exe reg.exe PID 1784 wrote to memory of 1252 1784 explorer.exe reg.exe PID 1784 wrote to memory of 1836 1784 explorer.exe reg.exe PID 1784 wrote to memory of 1836 1784 explorer.exe reg.exe PID 1784 wrote to memory of 1836 1784 explorer.exe reg.exe PID 1784 wrote to memory of 1836 1784 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn hglufriqw /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dll\"" /SC ONCE /Z /ST 17:05 /ET 17:174⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {0C565F0A-3453-468E-B317-BF1C0A31BCCA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Wodmqh" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ilyaipewav" /d "0"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dllMD5
9e07c7734ebe26f50037757a577a9cfc
SHA16ecf7db4b483922559ce0f7000cf47e46b0a97e8
SHA256d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d
SHA5128d881a7d82f6e9c8de009ac4aeb5dd2480f49ff999f8a3f34dc6ac92ac279e247e0d1a22b6c6769a03f5db6758db1cb7cbaaf0ee6cbbaf65ddc6f56acbf399d6
-
\Users\Admin\AppData\Local\Temp\d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d.dllMD5
9e07c7734ebe26f50037757a577a9cfc
SHA16ecf7db4b483922559ce0f7000cf47e46b0a97e8
SHA256d7db78c9d345372e746a3f0769532c71d9596d084f77fc75d3c992fdd528a49d
SHA5128d881a7d82f6e9c8de009ac4aeb5dd2480f49ff999f8a3f34dc6ac92ac279e247e0d1a22b6c6769a03f5db6758db1cb7cbaaf0ee6cbbaf65ddc6f56acbf399d6
-
memory/552-63-0x0000000000380000-0x0000000000382000-memory.dmpFilesize
8KB
-
memory/552-66-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/552-65-0x0000000075031000-0x0000000075033000-memory.dmpFilesize
8KB
-
memory/868-73-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/868-71-0x00000000009D0000-0x0000000000B78000-memory.dmpFilesize
1.7MB
-
memory/868-79-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/868-74-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/868-75-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/868-72-0x0000000000820000-0x0000000000841000-memory.dmpFilesize
132KB
-
memory/1000-67-0x000007FEFC371000-0x000007FEFC373000-memory.dmpFilesize
8KB
-
memory/1732-58-0x00000000002B0000-0x00000000002D1000-memory.dmpFilesize
132KB
-
memory/1732-56-0x0000000001E70000-0x0000000002018000-memory.dmpFilesize
1.7MB
-
memory/1732-61-0x0000000000240000-0x0000000000283000-memory.dmpFilesize
268KB
-
memory/1732-55-0x0000000076851000-0x0000000076853000-memory.dmpFilesize
8KB
-
memory/1732-57-0x00000000002B0000-0x00000000002D1000-memory.dmpFilesize
132KB
-
memory/1732-60-0x00000000002B0000-0x00000000002D1000-memory.dmpFilesize
132KB
-
memory/1732-59-0x00000000002B0000-0x00000000002D1000-memory.dmpFilesize
132KB
-
memory/1732-62-0x00000000002B0000-0x00000000002D1000-memory.dmpFilesize
132KB
-
memory/1784-80-0x00000000000C0000-0x00000000000E1000-memory.dmpFilesize
132KB