Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-03-2022 15:41
Static task
static1
Behavioral task
behavioral1
Sample
25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dll
Resource
win7-en-20211208
General
-
Target
25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dll
-
Size
260KB
-
MD5
fe15f6e8b10baf9851e57e015d7872e9
-
SHA1
2f020ab87076231da8699f08a2029d3f78557318
-
SHA256
25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc
-
SHA512
88d4c551b6926c9eb73fcfcf899a189b9a93285a77d6fd1663a8ff6fa193587250468af19016dc5bcc4ed316da3ff0a9b78b7fca96c6288973c95df616100dcb
Malware Config
Extracted
qakbot
401.51
abc105
1606839097
90.101.117.122:2222
78.97.207.104:443
189.222.242.165:995
95.76.27.6:443
2.50.56.81:443
96.225.88.23:443
47.21.192.182:2222
189.222.242.165:443
197.86.204.38:443
84.117.176.32:443
93.146.133.102:2222
71.38.13.243:443
96.21.251.127:2222
184.98.97.227:995
58.179.21.147:995
187.213.136.249:995
65.30.213.13:6882
80.195.103.146:2222
106.51.85.162:443
187.227.87.235:995
94.59.236.155:995
94.53.16.196:443
89.137.211.239:443
190.162.118.43:0
45.32.162.253:443
45.32.165.134:443
140.82.27.132:443
173.245.152.231:443
92.137.138.52:2222
92.154.83.96:1194
190.220.8.10:993
151.75.13.83:443
77.132.113.187:2222
186.147.222.63:443
2.51.246.190:995
69.47.239.10:443
68.116.193.239:443
96.27.47.70:2222
68.134.181.98:443
197.45.110.165:995
86.99.134.235:2222
71.83.16.211:443
78.96.199.79:443
189.210.115.207:443
24.179.13.119:443
74.102.76.128:443
84.126.11.130:443
176.181.247.197:443
173.169.189.169:443
187.149.126.53:443
68.131.19.52:443
189.140.45.48:995
86.98.34.84:995
208.82.44.203:443
200.30.223.162:443
184.21.136.237:995
65.131.47.74:995
71.197.126.250:443
72.252.201.69:443
82.12.157.95:995
187.153.119.36:443
24.71.28.247:443
72.36.11.22:443
181.208.249.141:443
200.110.188.218:443
118.70.55.146:443
39.32.55.12:995
62.38.114.12:2222
104.37.20.207:995
172.87.157.235:443
185.163.221.77:2222
197.161.154.132:443
83.110.150.100:443
151.60.163.18:443
73.51.245.231:995
67.8.103.21:443
37.210.131.246:443
151.27.89.199:443
79.129.216.215:2222
75.136.26.147:443
94.69.112.148:2222
41.97.183.51:443
5.13.70.10:443
85.132.36.111:2222
67.237.68.126:2222
96.247.176.125:443
80.11.5.65:2222
184.179.14.130:22
156.205.103.107:995
67.61.157.208:443
93.113.177.152:443
24.209.209.72:443
197.206.132.79:443
72.240.200.181:2222
96.41.93.96:443
85.122.141.42:995
108.46.145.30:443
2.232.253.79:995
79.172.26.240:443
5.193.115.251:2222
71.182.142.63:443
72.28.255.159:995
85.204.189.105:443
196.151.252.84:443
98.240.24.57:443
67.82.244.199:2222
189.141.31.12:443
193.248.154.174:2222
120.151.95.167:443
178.222.114.132:995
172.87.134.226:443
151.45.108.75:443
173.47.125.178:995
24.139.72.117:443
45.118.216.157:443
74.75.237.11:443
24.187.56.74:2222
75.109.180.221:443
197.135.177.36:443
190.103.55.108:443
81.214.126.173:2222
87.27.110.90:2222
185.246.9.69:995
217.133.54.140:32100
78.97.3.6:443
189.150.40.192:2222
87.218.53.206:2222
181.169.88.203:443
94.49.188.240:443
46.124.107.124:6881
83.202.68.220:2222
47.187.49.3:2222
83.196.50.197:2222
2.90.33.130:443
109.209.94.165:2222
79.119.124.237:443
2.88.53.159:995
86.120.64.243:443
116.240.78.45:995
94.53.92.42:443
181.129.155.10:443
67.6.54.180:443
96.40.175.33:443
149.28.98.196:995
109.205.204.229:2222
45.63.107.192:2222
74.129.26.119:443
173.88.7.176:443
206.183.190.53:993
94.141.3.242:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1696 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1736 rundll32.exe 1736 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 1736 rundll32.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exedescription pid process target process PID 1204 wrote to memory of 1736 1204 rundll32.exe rundll32.exe PID 1204 wrote to memory of 1736 1204 rundll32.exe rundll32.exe PID 1204 wrote to memory of 1736 1204 rundll32.exe rundll32.exe PID 1204 wrote to memory of 1736 1204 rundll32.exe rundll32.exe PID 1204 wrote to memory of 1736 1204 rundll32.exe rundll32.exe PID 1204 wrote to memory of 1736 1204 rundll32.exe rundll32.exe PID 1204 wrote to memory of 1736 1204 rundll32.exe rundll32.exe PID 1736 wrote to memory of 816 1736 rundll32.exe explorer.exe PID 1736 wrote to memory of 816 1736 rundll32.exe explorer.exe PID 1736 wrote to memory of 816 1736 rundll32.exe explorer.exe PID 1736 wrote to memory of 816 1736 rundll32.exe explorer.exe PID 1736 wrote to memory of 816 1736 rundll32.exe explorer.exe PID 1736 wrote to memory of 816 1736 rundll32.exe explorer.exe PID 816 wrote to memory of 1260 816 explorer.exe schtasks.exe PID 816 wrote to memory of 1260 816 explorer.exe schtasks.exe PID 816 wrote to memory of 1260 816 explorer.exe schtasks.exe PID 816 wrote to memory of 1260 816 explorer.exe schtasks.exe PID 1312 wrote to memory of 1620 1312 taskeng.exe regsvr32.exe PID 1312 wrote to memory of 1620 1312 taskeng.exe regsvr32.exe PID 1312 wrote to memory of 1620 1312 taskeng.exe regsvr32.exe PID 1312 wrote to memory of 1620 1312 taskeng.exe regsvr32.exe PID 1312 wrote to memory of 1620 1312 taskeng.exe regsvr32.exe PID 1620 wrote to memory of 1696 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1696 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1696 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1696 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1696 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1696 1620 regsvr32.exe regsvr32.exe PID 1620 wrote to memory of 1696 1620 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn mjynedudr /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dll\"" /SC ONCE /Z /ST 13:50 /ET 14:024⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {F21D1F13-0755-49E8-8C40-70891FF60BD0} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dll"3⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dllMD5
13fb15f6b1432085d7d036e47bce2b00
SHA18050392b8cc529e26050f05af4d1dc899da2a0fd
SHA256bc4e3c88795aa51d7a4b5e7f5f2b544001454e0ed273f612d4e16efb04e7899b
SHA512762dc2936466ddaf92c6df9b7b68242a4942562e7b4f911ad929a9bc4a44688b234cb38b3cbad3c025641644be834a36c70658cfd48d7ba0a877edf321dfa53a
-
\Users\Admin\AppData\Local\Temp\25f1b4c0189c34eb3f191f28329de73ee11334f0d545cc33562768d5330a20dc.dllMD5
13fb15f6b1432085d7d036e47bce2b00
SHA18050392b8cc529e26050f05af4d1dc899da2a0fd
SHA256bc4e3c88795aa51d7a4b5e7f5f2b544001454e0ed273f612d4e16efb04e7899b
SHA512762dc2936466ddaf92c6df9b7b68242a4942562e7b4f911ad929a9bc4a44688b234cb38b3cbad3c025641644be834a36c70658cfd48d7ba0a877edf321dfa53a
-
memory/816-58-0x0000000000080000-0x0000000000082000-memory.dmpFilesize
8KB
-
memory/816-61-0x00000000746F1000-0x00000000746F3000-memory.dmpFilesize
8KB
-
memory/816-62-0x0000000000C30000-0x0000000000EB1000-memory.dmpFilesize
2.5MB
-
memory/816-63-0x00000000000E0000-0x0000000000101000-memory.dmpFilesize
132KB
-
memory/1620-64-0x000007FEFBD71000-0x000007FEFBD73000-memory.dmpFilesize
8KB
-
memory/1736-55-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB
-
memory/1736-56-0x00000000001A0000-0x00000000001E1000-memory.dmpFilesize
260KB
-
memory/1736-57-0x0000000010000000-0x0000000010041000-memory.dmpFilesize
260KB