Overview
overview
10Static
static
10021865faa3...bf.dll
windows7_x64
10021865faa3...bf.dll
windows10-2004_x64
1026de26ea18...ff.dll
windows7_x64
1026de26ea18...ff.dll
windows10-2004_x64
10305e8e14bc...f8.dll
windows7_x64
10305e8e14bc...f8.dll
windows10-2004_x64
1047ea7ae3c9...94.dll
windows7_x64
1047ea7ae3c9...94.dll
windows10-2004_x64
1051ab9788b9...77.dll
windows7_x64
1051ab9788b9...77.dll
windows10-2004_x64
10587547a79f...fd.dll
windows7_x64
10587547a79f...fd.dll
windows10-2004_x64
1058878537dc...14.dll
windows7_x64
1058878537dc...14.dll
windows10-2004_x64
106909c2801f...37.dll
windows7_x64
106909c2801f...37.dll
windows10-2004_x64
1069ac3f3a76...85.dll
windows7_x64
1069ac3f3a76...85.dll
windows10-2004_x64
106ce8fbedc5...f2.dll
windows7_x64
106ce8fbedc5...f2.dll
windows10-2004_x64
107a91436b7a...0c.dll
windows7_x64
107a91436b7a...0c.dll
windows10-2004_x64
108f5843efe1...d4.dll
windows7_x64
108f5843efe1...d4.dll
windows10-2004_x64
1098d07ae48b...0b.dll
windows7_x64
1098d07ae48b...0b.dll
windows10-2004_x64
109c5c2af628...c7.dll
windows7_x64
109c5c2af628...c7.dll
windows10-2004_x64
109e00cf7d03...0d.dll
windows7_x64
109e00cf7d03...0d.dll
windows10-2004_x64
109e7db9c87f...2b.dll
windows7_x64
109e7db9c87f...2b.dll
windows10-2004_x64
10Analysis
-
max time kernel
4294217s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-03-2022 11:20
Static task
static1
Behavioral task
behavioral1
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win7-20220310-en
Behavioral task
behavioral16
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win7-20220310-en
Behavioral task
behavioral20
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral21
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral25
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win7-20220310-en
Behavioral task
behavioral26
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win7-20220310-en
Behavioral task
behavioral30
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral31
Sample
9e7db9c87fc4374a2c88cc5f1bdc540205e161423010b2ee826b88b7b3503f2b.dll
Resource
win7-20220310-en
General
-
Target
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
-
Size
378KB
-
MD5
7a35246c94d5dd27aff56a7862b1d33e
-
SHA1
24b38e564c4027dbf26ba3bf766335c5be029faf
-
SHA256
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b
-
SHA512
011e4860daa0f1bc977e6fe1c006c29b93386af5f313170661cd4f5d697b82da906f689050fa37696ee31f8fbfa1bd95339c7f8358bc14b0c63c62f35a46d985
Malware Config
Extracted
qakbot
402.343
obama104
1632729661
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1312 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\71924ed4 = ccedc8571e7ccebd63ffedd7a01ee17cb0d538f6e101e1b918ccb6a2c60f02fae4602a32b254e02162fc99d5699ef91617b9f665 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\440d9e9a = a03d7290425893e4bd1426b3427bfcb8ee5bd65d6a16dc0a4e2317cec2737a52d0864df9ec4f415825227ffb9e80910d5bc7d885c00416f62f6b91872a1dbec683fda08d19243b2c3ea106c42b3f0374545216641bf09c0cd07fa26abd30e2ea338e16ad44877f6798bf33be1ed7baf1c9e45a18d24cf3cd053425fe4fb30b2fddc2b13493731891bffc63e9ae36c772dfa9ba969f90faa544f137123929e1eea80b67912821e5950eebab43770585d811b8ac3882577d8f0392d2f8033ba4ec9474 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\464cbee6 = 1750a4f8bf39dd07743d5da812dc20aa83a18e0b3e4c86683899d66c087ba81423 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\fef0d983 = cae85222f9120b988c8f65c217f2cceaece453bcfe25a9b5dad5ae8d04c3bc75 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\3b44f16c = 5505429467f8a82659efd31f45dd3a97e0751466575e22c03fcef9c3fa597838c9a51d509689ca4a8117bad4c97059e937766d5fa372c232fd30baf4aff619808fe8fadd9837fa2338ceec4fcdea9018abfe1a266a5b328af1dc5e1e57f8998b4a7bb3ec89ef explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\71924ed4 = cceddf571e7cfb52e9389e1844ebdabc0946ffd4ae92f4647b07be3435bc4ac148bdb4529837aaf836ea734cc512e91b4f8c6cef393ea5a0e3d9aaadf07b7c1b463586291280af82b8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\83f89609 = a6e84a5c6ca0334ace35fd921cccf245aac0c769e09712a2f3b8f48ddc1f60d3e3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\fcb1f9ff = c94f09b10077f1b3dd26404e6cfa2d57459bf9e395c06d4cd51c93008cfc5fa6b9cafb3abd1c9269abcfe9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Vlpjscuoaqzf\edb2122 = 1b8a3d00d1b51f658baaea08e0791ab9402455862612faae9fd4d23c71406c49dfa3b553f9fcff2265dd2f4e428de63502383407c65155a650cf3d6d4ee2ca9666b0e673754f657c87fd0f27d8d8d180bc5e69b4f2197a60b0f5fbe73db716 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 960 rundll32.exe 1312 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 960 rundll32.exe 1312 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1548 wrote to memory of 960 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 960 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 960 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 960 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 960 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 960 1548 rundll32.exe rundll32.exe PID 1548 wrote to memory of 960 1548 rundll32.exe rundll32.exe PID 960 wrote to memory of 1884 960 rundll32.exe explorer.exe PID 960 wrote to memory of 1884 960 rundll32.exe explorer.exe PID 960 wrote to memory of 1884 960 rundll32.exe explorer.exe PID 960 wrote to memory of 1884 960 rundll32.exe explorer.exe PID 960 wrote to memory of 1884 960 rundll32.exe explorer.exe PID 960 wrote to memory of 1884 960 rundll32.exe explorer.exe PID 1884 wrote to memory of 428 1884 explorer.exe schtasks.exe PID 1884 wrote to memory of 428 1884 explorer.exe schtasks.exe PID 1884 wrote to memory of 428 1884 explorer.exe schtasks.exe PID 1884 wrote to memory of 428 1884 explorer.exe schtasks.exe PID 972 wrote to memory of 1344 972 taskeng.exe regsvr32.exe PID 972 wrote to memory of 1344 972 taskeng.exe regsvr32.exe PID 972 wrote to memory of 1344 972 taskeng.exe regsvr32.exe PID 972 wrote to memory of 1344 972 taskeng.exe regsvr32.exe PID 972 wrote to memory of 1344 972 taskeng.exe regsvr32.exe PID 1344 wrote to memory of 1312 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1312 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1312 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1312 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1312 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1312 1344 regsvr32.exe regsvr32.exe PID 1344 wrote to memory of 1312 1344 regsvr32.exe regsvr32.exe PID 1312 wrote to memory of 1324 1312 regsvr32.exe explorer.exe PID 1312 wrote to memory of 1324 1312 regsvr32.exe explorer.exe PID 1312 wrote to memory of 1324 1312 regsvr32.exe explorer.exe PID 1312 wrote to memory of 1324 1312 regsvr32.exe explorer.exe PID 1312 wrote to memory of 1324 1312 regsvr32.exe explorer.exe PID 1312 wrote to memory of 1324 1312 regsvr32.exe explorer.exe PID 1324 wrote to memory of 928 1324 explorer.exe reg.exe PID 1324 wrote to memory of 928 1324 explorer.exe reg.exe PID 1324 wrote to memory of 928 1324 explorer.exe reg.exe PID 1324 wrote to memory of 928 1324 explorer.exe reg.exe PID 1324 wrote to memory of 1360 1324 explorer.exe reg.exe PID 1324 wrote to memory of 1360 1324 explorer.exe reg.exe PID 1324 wrote to memory of 1360 1324 explorer.exe reg.exe PID 1324 wrote to memory of 1360 1324 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn gsnjhuen /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll\"" /SC ONCE /Z /ST 12:24 /ET 12:364⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {EB267A51-502A-4B60-BFAF-257367789879} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Gefteuyiuk" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Pedyedut" /d "0"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dllMD5
7a35246c94d5dd27aff56a7862b1d33e
SHA124b38e564c4027dbf26ba3bf766335c5be029faf
SHA25698d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b
SHA512011e4860daa0f1bc977e6fe1c006c29b93386af5f313170661cd4f5d697b82da906f689050fa37696ee31f8fbfa1bd95339c7f8358bc14b0c63c62f35a46d985
-
\Users\Admin\AppData\Local\Temp\98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dllMD5
7a35246c94d5dd27aff56a7862b1d33e
SHA124b38e564c4027dbf26ba3bf766335c5be029faf
SHA25698d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b
SHA512011e4860daa0f1bc977e6fe1c006c29b93386af5f313170661cd4f5d697b82da906f689050fa37696ee31f8fbfa1bd95339c7f8358bc14b0c63c62f35a46d985
-
memory/960-54-0x0000000075EA1000-0x0000000075EA3000-memory.dmpFilesize
8KB
-
memory/960-55-0x00000000006C0000-0x0000000000702000-memory.dmpFilesize
264KB
-
memory/960-56-0x0000000010000000-0x0000000010062000-memory.dmpFilesize
392KB
-
memory/1312-70-0x0000000000170000-0x00000000001B2000-memory.dmpFilesize
264KB
-
memory/1312-71-0x0000000010000000-0x0000000010062000-memory.dmpFilesize
392KB
-
memory/1324-72-0x00000000000C0000-0x00000000000E1000-memory.dmpFilesize
132KB
-
memory/1344-62-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmpFilesize
8KB
-
memory/1884-57-0x00000000000B0000-0x00000000000B2000-memory.dmpFilesize
8KB
-
memory/1884-60-0x0000000074CC1000-0x0000000074CC3000-memory.dmpFilesize
8KB
-
memory/1884-61-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB