Overview
overview
10Static
static
10021865faa3...bf.dll
windows7_x64
10021865faa3...bf.dll
windows10-2004_x64
1026de26ea18...ff.dll
windows7_x64
1026de26ea18...ff.dll
windows10-2004_x64
10305e8e14bc...f8.dll
windows7_x64
10305e8e14bc...f8.dll
windows10-2004_x64
1047ea7ae3c9...94.dll
windows7_x64
1047ea7ae3c9...94.dll
windows10-2004_x64
1051ab9788b9...77.dll
windows7_x64
1051ab9788b9...77.dll
windows10-2004_x64
10587547a79f...fd.dll
windows7_x64
10587547a79f...fd.dll
windows10-2004_x64
1058878537dc...14.dll
windows7_x64
1058878537dc...14.dll
windows10-2004_x64
106909c2801f...37.dll
windows7_x64
106909c2801f...37.dll
windows10-2004_x64
1069ac3f3a76...85.dll
windows7_x64
1069ac3f3a76...85.dll
windows10-2004_x64
106ce8fbedc5...f2.dll
windows7_x64
106ce8fbedc5...f2.dll
windows10-2004_x64
107a91436b7a...0c.dll
windows7_x64
107a91436b7a...0c.dll
windows10-2004_x64
108f5843efe1...d4.dll
windows7_x64
108f5843efe1...d4.dll
windows10-2004_x64
1098d07ae48b...0b.dll
windows7_x64
1098d07ae48b...0b.dll
windows10-2004_x64
109c5c2af628...c7.dll
windows7_x64
109c5c2af628...c7.dll
windows10-2004_x64
109e00cf7d03...0d.dll
windows7_x64
109e00cf7d03...0d.dll
windows10-2004_x64
109e7db9c87f...2b.dll
windows7_x64
109e7db9c87f...2b.dll
windows10-2004_x64
10Analysis
-
max time kernel
160s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-03-2022 11:20
Static task
static1
Behavioral task
behavioral1
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win7-20220310-en
Behavioral task
behavioral16
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win7-20220310-en
Behavioral task
behavioral20
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral21
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral25
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win7-20220310-en
Behavioral task
behavioral26
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win7-20220310-en
Behavioral task
behavioral30
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral31
Sample
9e7db9c87fc4374a2c88cc5f1bdc540205e161423010b2ee826b88b7b3503f2b.dll
Resource
win7-20220310-en
General
-
Target
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
-
Size
196KB
-
MD5
f980881cded6a7dd5cef8b13a52c2af6
-
SHA1
8f33fecbe739ef136fca4b4dcbfcc65c2866635a
-
SHA256
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4
-
SHA512
369db67d6a117ae80c01edc055b908aaa2088af00484b9c00100f5df8381744e76f20a87f4dac712e5b9c33c6b8ce331e0c8ddd3d224379828e411e0810e1fca
Malware Config
Extracted
qakbot
401.138
abc119
1611224824
106.51.52.111:443
83.110.12.140:2222
89.3.198.238:443
86.220.60.133:2222
45.77.115.208:8443
45.77.115.208:995
71.117.132.169:443
82.76.47.211:443
125.63.101.62:443
86.98.93.124:2078
178.152.70.12:995
78.97.207.104:443
77.27.174.49:995
173.70.165.101:995
64.121.114.87:443
188.24.128.253:443
89.137.211.239:995
80.227.5.70:443
81.97.154.100:443
98.121.187.78:443
42.3.8.54:443
31.5.21.66:995
80.7.129.64:995
84.72.35.226:443
188.25.63.105:443
140.82.49.12:443
216.201.162.158:443
2.50.2.216:443
75.136.40.155:443
79.129.252.62:2222
2.7.69.217:2222
51.9.198.164:2222
96.19.117.140:443
75.67.192.125:443
24.27.82.216:2222
105.198.236.99:443
95.77.223.148:443
97.69.160.4:2222
78.63.226.32:443
172.78.30.215:443
202.184.210.27:443
86.236.77.68:2222
197.161.154.132:443
105.198.236.101:443
41.205.16.179:443
85.132.36.111:2222
203.106.195.67:443
172.87.157.235:3389
193.248.221.184:2222
69.123.179.70:443
149.28.98.196:443
207.246.116.237:995
207.246.77.75:2222
207.246.116.237:2222
149.28.98.196:995
45.77.115.208:2222
207.246.77.75:995
149.28.99.97:443
149.28.99.97:2222
149.28.99.97:995
149.28.101.90:995
149.28.101.90:2222
149.28.101.90:8443
149.28.101.90:443
45.63.107.192:995
197.45.110.165:995
144.202.38.185:443
45.32.211.207:2222
45.32.211.207:443
45.32.211.207:8443
45.63.107.192:2222
207.246.77.75:8443
149.28.98.196:2222
45.77.115.208:443
45.32.211.207:995
207.246.77.75:443
45.63.107.192:443
207.246.116.237:443
144.202.38.185:995
207.246.116.237:8443
144.202.38.185:2222
173.21.10.71:2222
27.223.92.142:995
86.124.93.144:443
217.133.54.140:32100
95.76.27.6:443
106.250.150.98:443
94.53.92.42:443
69.47.239.10:443
47.208.8.187:443
71.14.110.199:443
75.136.26.147:443
71.74.12.34:443
96.37.113.36:993
76.111.128.194:443
202.188.138.162:443
74.68.144.202:443
180.222.161.85:443
70.168.130.172:995
201.143.95.254:443
201.127.5.175:443
76.25.142.196:443
67.165.206.193:993
50.244.112.106:443
90.175.88.99:2222
186.155.151.167:443
24.201.61.153:2078
80.106.85.24:2222
72.204.242.138:443
151.60.82.200:443
96.227.127.13:995
83.110.248.121:995
184.189.122.72:443
47.146.169.85:443
47.22.148.6:443
76.94.200.148:995
71.197.126.250:443
92.59.35.196:2222
190.85.91.154:443
189.237.7.9:443
71.187.170.235:443
79.129.121.81:995
12.5.37.4:995
81.88.254.62:443
189.210.115.207:443
67.6.91.75:443
83.110.108.181:2222
24.152.219.253:995
108.160.123.244:443
50.29.166.232:995
105.226.208.140:443
45.46.53.140:2222
142.129.227.86:443
68.225.60.77:995
184.179.14.130:22
196.151.252.84:443
78.96.168.18:443
72.240.200.181:2222
209.210.187.52:443
74.75.237.11:443
46.153.36.53:995
84.232.252.202:2222
24.43.22.218:993
71.182.142.63:443
31.215.69.207:443
68.186.192.69:443
98.116.21.115:443
72.252.201.69:443
151.205.102.42:443
172.87.134.226:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 628 regsvr32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4440 628 WerFault.exe regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
regsvr32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
regsvr32.exepid process 1216 regsvr32.exe 1216 regsvr32.exe 1216 regsvr32.exe 1216 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 1216 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exeregsvr32.exedescription pid process target process PID 4304 wrote to memory of 1216 4304 regsvr32.exe regsvr32.exe PID 4304 wrote to memory of 1216 4304 regsvr32.exe regsvr32.exe PID 4304 wrote to memory of 1216 4304 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 2856 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 2856 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 2856 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 2856 1216 regsvr32.exe explorer.exe PID 1216 wrote to memory of 2856 1216 regsvr32.exe explorer.exe PID 2856 wrote to memory of 2692 2856 explorer.exe schtasks.exe PID 2856 wrote to memory of 2692 2856 explorer.exe schtasks.exe PID 2856 wrote to memory of 2692 2856 explorer.exe schtasks.exe PID 940 wrote to memory of 628 940 regsvr32.exe regsvr32.exe PID 940 wrote to memory of 628 940 regsvr32.exe regsvr32.exe PID 940 wrote to memory of 628 940 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ghllexrm /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll\"" /SC ONCE /Z /ST 12:24 /ET 12:364⤵
- Creates scheduled task(s)
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll"2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 5843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 628 -ip 6281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dllMD5
892bdbc4b92f477faa8172b81eb1a56a
SHA10a70193badc6b7d68f09a2357720b81400e61122
SHA2560d8296365e797e7799efccfbf61ce4f55f8c4a1a4beaf7c0dd4595345dd8de42
SHA512dd57c6f4aa75dda16c501e1d90a87a95f4f84c2a04036f15e27372270b026d39ad7c760585a4e598ca61b6f285c9172d08208654e3634a28613eadd9118b49a9
-
C:\Users\Admin\AppData\Local\Temp\8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dllMD5
892bdbc4b92f477faa8172b81eb1a56a
SHA10a70193badc6b7d68f09a2357720b81400e61122
SHA2560d8296365e797e7799efccfbf61ce4f55f8c4a1a4beaf7c0dd4595345dd8de42
SHA512dd57c6f4aa75dda16c501e1d90a87a95f4f84c2a04036f15e27372270b026d39ad7c760585a4e598ca61b6f285c9172d08208654e3634a28613eadd9118b49a9
-
memory/2856-134-0x0000000000610000-0x0000000000A43000-memory.dmpFilesize
4.2MB
-
memory/2856-135-0x0000000000330000-0x0000000000365000-memory.dmpFilesize
212KB