Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14-02-2022 16:40
Static task
static1
Behavioral task
behavioral1
Sample
52321edc0c5a3fcb824d591c730e7783194ec5e1c0f617b40ffe760a876924eb.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
52321edc0c5a3fcb824d591c730e7783194ec5e1c0f617b40ffe760a876924eb.dll
Resource
win10v2004-en-20220113
General
-
Target
52321edc0c5a3fcb824d591c730e7783194ec5e1c0f617b40ffe760a876924eb.dll
-
Size
167KB
-
MD5
0c9bef0496980f1304a14e3fa7737146
-
SHA1
4a40d0bbe792271c0911c09c5cdd577d7e38a399
-
SHA256
52321edc0c5a3fcb824d591c730e7783194ec5e1c0f617b40ffe760a876924eb
-
SHA512
a910b0db163f6cec3914096b3b5a05503a3e92cec82fe60e900157a173bdc154c7376bb229b01612b05eb084427ea3820291d66714b00fd9bec7098972aef916
Malware Config
Extracted
qakbot
322.148
1518695014
Protocol: ftp- Host:
66.96.133.9 - Port:
21 - Username:
help - Password:
eT5TerAcnFe6~
Protocol: ftp- Host:
174.123.38.58 - Port:
21 - Username:
[email protected] - Password:
4BQ1MeeRAwNZEVu
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
[email protected] - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
[email protected] - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
[email protected] - Password:
RoP4Af0RKAAQ74V
179.62.153.88:443
50.198.141.161:2222
69.129.91.38:443
66.189.228.49:995
96.253.104.73:443
71.183.129.113:443
125.25.130.203:995
173.175.174.154:443
162.104.186.175:995
75.109.222.140:995
68.173.55.51:443
78.175.254.43:443
106.159.251.143:995
47.143.83.172:443
71.190.202.120:443
73.136.232.174:995
96.253.104.73:995
192.158.217.32:22
65.153.16.250:993
70.95.129.59:443
105.225.253.101:443
216.93.143.182:995
71.41.141.206:443
69.129.91.38:32102
47.223.78.244:993
47.40.29.239:443
47.33.213.104:443
74.93.207.181:993
178.54.193.161:443
156.217.12.177:443
66.222.48.40:443
96.70.92.177:1194
74.95.207.214:990
47.221.46.163:443
65.73.215.139:990
198.0.111.129:443
70.117.246.103:443
96.253.104.73:50002
24.240.235.106:443
68.133.47.184:443
70.167.30.88:443
216.218.74.196:443
199.115.167.168:443
132.206.59.132:443
74.95.207.214:443
72.204.249.114:2222
87.243.32.159:443
76.0.178.104:443
189.155.221.97:993
209.212.131.66:443
78.158.195.141:995
47.201.56.21:443
65.40.207.151:995
47.149.85.238:443
104.231.199.203:443
69.193.199.50:443
74.84.15.214:443
174.66.86.206:443
190.137.200.166:443
216.201.159.118:443
99.196.254.46:443
73.126.4.33:443
68.5.211.85:443
50.42.189.206:993
78.182.109.227:443
98.103.2.226:443
75.127.141.50:995
65.100.49.186:465
12.161.77.98:443
109.75.195.157:443
76.27.69.75:443
70.94.109.57:443
65.153.16.250:995
50.195.161.2:995
98.216.56.48:443
47.22.21.180:995
67.83.122.112:2222
209.213.24.194:443
97.68.164.170:990
24.176.181.14:443
142.114.93.235:2222
75.83.30.135:443
68.50.161.232:443
31.206.147.0:995
24.119.224.202:2078
68.0.186.126:443
184.186.73.221:443
100.35.65.82:995
174.57.88.157:443
46.175.67.170:443
50.74.66.214:443
96.85.138.153:995
71.85.72.9:443
175.107.54.44:443
65.153.16.250:465
103.228.43.58:443
76.104.40.157:443
68.203.159.21:443
73.1.116.205:443
86.57.136.126:990
73.136.132.231:443
192.158.217.32:443
70.189.67.15:443
45.36.199.50:443
186.107.214.4:443
173.49.95.92:443
203.109.206.203:465
73.198.142.130:995
174.58.149.247:443
98.74.157.85:443
73.206.97.214:443
104.33.67.39:443
135.84.195.154:995
189.155.221.97:995
73.182.163.200:443
50.73.23.181:995
74.95.207.214:995
73.93.154.150:443
186.109.26.149:443
65.100.49.186:443
74.95.207.214:465
74.69.244.255:443
68.83.130.163:443
73.77.17.146:443
108.58.129.90:443
74.42.21.175:995
49.151.84.2:443
108.35.28.73:443
98.218.243.27:443
76.177.73.90:995
71.41.225.171:443
24.187.255.116:443
24.223.103.6:443
74.95.207.214:993
76.95.241.114:443
69.41.8.88:443
23.240.50.137:443
47.201.138.241:443
69.132.80.73:443
68.198.107.62:2222
65.33.119.17:443
50.244.177.253:443
65.100.49.186:995
12.166.108.82:995
108.58.129.90:995
187.138.102.154:443
65.100.49.186:2222
50.44.111.101:443
170.231.89.56:2222
108.27.217.183:443
Signatures
-
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 3392 svchost.exe Token: SeCreatePagefilePrivilege 3392 svchost.exe Token: SeShutdownPrivilege 3392 svchost.exe Token: SeCreatePagefilePrivilege 3392 svchost.exe Token: SeShutdownPrivilege 3392 svchost.exe Token: SeCreatePagefilePrivilege 3392 svchost.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe Token: SeRestorePrivilege 2292 TiWorker.exe Token: SeSecurityPrivilege 2292 TiWorker.exe Token: SeBackupPrivilege 2292 TiWorker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3184 wrote to memory of 4128 3184 rundll32.exe rundll32.exe PID 3184 wrote to memory of 4128 3184 rundll32.exe rundll32.exe PID 3184 wrote to memory of 4128 3184 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52321edc0c5a3fcb824d591c730e7783194ec5e1c0f617b40ffe760a876924eb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52321edc0c5a3fcb824d591c730e7783194ec5e1c0f617b40ffe760a876924eb.dll,#12⤵PID:4128
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2292