Analysis
-
max time kernel
151s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 21:54
Static task
static1
Behavioral task
behavioral1
Sample
local.dll
Resource
win7-20220414-en
General
-
Target
local.dll
-
Size
843KB
-
MD5
3fb78f4c9c7393ac16f242d32c554f54
-
SHA1
e72c5ecaa6e5b7a0084accf1c18118a1851fc8ee
-
SHA256
e8d0bfcbdfb86ee8c3a2e1db06ade10715e5fdc7acef1fca18e1021b335f9f78
-
SHA512
d5cdd5b7b7277d56ffacc831ac78ca2684551f0c8b6b58debca688b13c50212facaa3c7a05518bc724180bb14ba4ebb00e910179f25205d4e5a80205d837826f
Malware Config
Extracted
qakbot
403.688
obama187
1654695312
197.164.182.46:993
70.51.135.90:2222
187.251.132.144:22
37.186.54.254:995
80.11.74.81:2222
41.84.236.245:995
24.139.72.117:443
177.94.57.126:32101
37.34.253.233:443
186.90.153.162:2222
32.221.224.140:995
208.107.221.224:443
67.165.206.193:993
63.143.92.99:995
88.232.220.207:443
189.78.107.163:32101
74.14.5.179:2222
148.0.56.63:443
40.134.246.185:995
173.21.10.71:2222
124.40.244.115:2222
24.55.67.176:443
39.44.164.54:995
102.182.232.3:995
39.49.101.104:995
31.35.28.29:443
120.150.218.241:995
197.89.128.201:443
31.48.174.63:2078
173.174.216.62:443
67.209.195.198:443
70.46.220.114:443
24.178.196.158:2222
92.132.172.197:2222
179.158.105.44:443
1.161.123.53:443
91.177.173.10:995
217.128.122.65:2222
144.202.3.39:995
144.202.2.175:443
45.76.167.26:995
149.28.238.199:995
140.82.63.183:995
140.82.63.183:443
45.63.1.12:443
149.28.238.199:443
45.76.167.26:443
144.202.3.39:443
144.202.2.175:995
45.63.1.12:995
109.12.111.14:443
84.241.8.23:32103
104.34.212.7:32103
108.60.213.141:443
117.248.109.38:21
217.165.109.10:993
82.152.39.39:443
47.23.89.60:993
176.67.56.94:443
148.64.96.100:443
76.70.9.169:2222
182.191.92.203:995
37.210.170.123:2222
202.134.152.2:2222
89.101.97.139:443
86.195.158.178:2222
140.82.49.12:443
93.48.80.198:995
187.207.131.50:61202
191.34.120.8:443
37.208.135.172:6883
75.99.168.194:61201
5.32.41.45:443
120.61.1.225:443
101.51.77.238:443
1.161.123.53:995
86.97.9.190:443
175.145.235.37:443
39.44.235.10:995
196.203.37.215:80
41.38.167.179:995
39.41.17.134:995
58.105.167.36:50000
39.52.119.141:995
76.25.142.196:443
73.151.236.31:443
96.37.113.36:993
174.69.215.101:443
201.142.177.168:443
85.246.82.244:443
201.145.165.25:443
201.172.23.68:2222
72.252.157.93:995
190.252.242.69:443
45.46.53.140:2222
79.80.80.29:2222
72.252.157.93:990
72.27.33.160:443
72.252.157.93:993
90.120.65.153:2078
201.103.141.2:443
69.14.172.24:443
31.215.185.26:2222
191.112.12.128:443
189.253.206.105:443
82.41.63.217:443
208.101.82.0:443
210.246.4.69:995
83.110.92.106:443
180.129.108.214:995
47.157.227.70:443
89.86.33.217:443
177.156.191.231:443
94.36.193.176:2222
217.164.121.161:1194
86.98.149.168:2222
103.207.85.38:995
172.115.177.204:2222
105.27.172.6:443
71.24.118.253:443
143.0.219.6:995
217.165.176.49:2222
5.203.199.157:995
121.7.223.45:2222
47.156.131.10:443
177.209.202.242:2222
41.86.42.158:995
106.51.48.170:50001
41.84.229.240:443
94.71.169.212:995
111.125.245.116:995
201.242.175.29:2222
38.70.253.226:2222
187.149.236.5:443
217.165.79.88:443
85.255.232.18:443
103.246.242.202:443
41.230.62.211:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Qprxa = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Ryudqgufcdl = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 336 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\e390fa27 = 43f074860a25e31cb3460d96d04e937b1b80f446e556a21110eb79d158afce37bc899a089a8c4458cdf9938da445de9726d8dc91be11d0561a76864f08106e0a1aac0cf1df0e9d78ba8c1f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\d60f2a69 = f7cc2891d36c1819afae9fc38751139b256caa9cb1b418c739994c7c086db5d0bc2eb0cd93e79e99ec630af54f64bb5ff8adb7381e73838e9c711bded4a89ff4d622df3a9a25ac0a1e9a1d6893cf6b84cfb5e44e1d6630514bf93ef591ed5af5a8ebe54ab763dc2a09eac49e0d0f73cd5dbe411d316baca056e9fa2d84cd9af27046a425f6803c524c9d7a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\d44e0a15 = 3c953ac55e7b1238031e2589f703494548 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\a946459f = 9836a4d8ef633f7865a91d3866670011575d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\6eb34d0c = f9bb91719a9cb2be15b214f8c438dadee17501c9f91a9abcf5e8dd01feaac77f49419ec039f8e14bd355e1aabf032668 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\6cf26d70 = 5e5f0590c4d70bfabdf9155517f170496515de138aaaba5500d08a3cd128bd1ddb94031182 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\11fa22fa = 3b47a511e79f5dea820123ac77a4ba0dea7eed76cdaedc7895ef72d3c676183978c21c6368dcf0ac703723f0e0ebf4246a586b3203cbe022c2596610a878e7 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\9cd995d1 = 785864a2a04db15b4c711933858ebe4f0fdbca4ea225c0a7839c1a74b05d60bb830a8b3b29cc6249dd3f02fc709b172093548523b8985557b35a3fad999a7fdd1b078ddbc2526fd7432d75687d201ac3a2fc359fdc802699f848febbe196a718144a8a06d14ac9cf9febc9de84e0f867 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Wqdornghnlui\e390fa27 = 43f063860a25d60c333aef64a049d98e513ae70c53e79daba0fe0c87c3fcdfe1e51f1fc2eeb20b8ad5b2838b4c98e981f750daec5a8ea4ec59991309a0208fc282121768eb182035611758fc1146662aee3fa16858bcf4bcf13391bd541592c6 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeexplorer.exeregsvr32.exepid process 1668 rundll32.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 336 regsvr32.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 1668 rundll32.exe 336 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 376 wrote to memory of 1668 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 1668 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 1668 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 1668 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 1668 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 1668 376 rundll32.exe rundll32.exe PID 376 wrote to memory of 1668 376 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1060 1668 rundll32.exe explorer.exe PID 1668 wrote to memory of 1060 1668 rundll32.exe explorer.exe PID 1668 wrote to memory of 1060 1668 rundll32.exe explorer.exe PID 1668 wrote to memory of 1060 1668 rundll32.exe explorer.exe PID 1668 wrote to memory of 1060 1668 rundll32.exe explorer.exe PID 1668 wrote to memory of 1060 1668 rundll32.exe explorer.exe PID 1060 wrote to memory of 1136 1060 explorer.exe schtasks.exe PID 1060 wrote to memory of 1136 1060 explorer.exe schtasks.exe PID 1060 wrote to memory of 1136 1060 explorer.exe schtasks.exe PID 1060 wrote to memory of 1136 1060 explorer.exe schtasks.exe PID 1820 wrote to memory of 1448 1820 taskeng.exe regsvr32.exe PID 1820 wrote to memory of 1448 1820 taskeng.exe regsvr32.exe PID 1820 wrote to memory of 1448 1820 taskeng.exe regsvr32.exe PID 1820 wrote to memory of 1448 1820 taskeng.exe regsvr32.exe PID 1820 wrote to memory of 1448 1820 taskeng.exe regsvr32.exe PID 1448 wrote to memory of 336 1448 regsvr32.exe regsvr32.exe PID 1448 wrote to memory of 336 1448 regsvr32.exe regsvr32.exe PID 1448 wrote to memory of 336 1448 regsvr32.exe regsvr32.exe PID 1448 wrote to memory of 336 1448 regsvr32.exe regsvr32.exe PID 1448 wrote to memory of 336 1448 regsvr32.exe regsvr32.exe PID 1448 wrote to memory of 336 1448 regsvr32.exe regsvr32.exe PID 1448 wrote to memory of 336 1448 regsvr32.exe regsvr32.exe PID 336 wrote to memory of 1944 336 regsvr32.exe explorer.exe PID 336 wrote to memory of 1944 336 regsvr32.exe explorer.exe PID 336 wrote to memory of 1944 336 regsvr32.exe explorer.exe PID 336 wrote to memory of 1944 336 regsvr32.exe explorer.exe PID 336 wrote to memory of 1944 336 regsvr32.exe explorer.exe PID 336 wrote to memory of 1944 336 regsvr32.exe explorer.exe PID 1944 wrote to memory of 2024 1944 explorer.exe reg.exe PID 1944 wrote to memory of 2024 1944 explorer.exe reg.exe PID 1944 wrote to memory of 2024 1944 explorer.exe reg.exe PID 1944 wrote to memory of 2024 1944 explorer.exe reg.exe PID 1944 wrote to memory of 864 1944 explorer.exe reg.exe PID 1944 wrote to memory of 864 1944 explorer.exe reg.exe PID 1944 wrote to memory of 864 1944 explorer.exe reg.exe PID 1944 wrote to memory of 864 1944 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\local.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\local.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn lczhpackl /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\local.dll\"" /SC ONCE /Z /ST 00:03 /ET 00:154⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {AA33897C-B966-466F-92B7-3CA6276D42B5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\local.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\local.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Qprxa" /d "0"5⤵
- Windows security bypass
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ryudqgufcdl" /d "0"5⤵
- Windows security bypass
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\local.dllFilesize
843KB
MD53fb78f4c9c7393ac16f242d32c554f54
SHA1e72c5ecaa6e5b7a0084accf1c18118a1851fc8ee
SHA256e8d0bfcbdfb86ee8c3a2e1db06ade10715e5fdc7acef1fca18e1021b335f9f78
SHA512d5cdd5b7b7277d56ffacc831ac78ca2684551f0c8b6b58debca688b13c50212facaa3c7a05518bc724180bb14ba4ebb00e910179f25205d4e5a80205d837826f
-
\Users\Admin\AppData\Local\Temp\local.dllFilesize
843KB
MD53fb78f4c9c7393ac16f242d32c554f54
SHA1e72c5ecaa6e5b7a0084accf1c18118a1851fc8ee
SHA256e8d0bfcbdfb86ee8c3a2e1db06ade10715e5fdc7acef1fca18e1021b335f9f78
SHA512d5cdd5b7b7277d56ffacc831ac78ca2684551f0c8b6b58debca688b13c50212facaa3c7a05518bc724180bb14ba4ebb00e910179f25205d4e5a80205d837826f
-
memory/336-84-0x0000000000B00000-0x0000000000B22000-memory.dmpFilesize
136KB
-
memory/336-80-0x0000000000B00000-0x0000000000B22000-memory.dmpFilesize
136KB
-
memory/336-79-0x0000000000AC0000-0x0000000000AF2000-memory.dmpFilesize
200KB
-
memory/336-77-0x0000000000B00000-0x0000000000B22000-memory.dmpFilesize
136KB
-
memory/336-78-0x0000000000B00000-0x0000000000B22000-memory.dmpFilesize
136KB
-
memory/336-76-0x0000000000B00000-0x0000000000B22000-memory.dmpFilesize
136KB
-
memory/336-72-0x0000000000000000-mapping.dmp
-
memory/336-75-0x0000000000760000-0x0000000000837000-memory.dmpFilesize
860KB
-
memory/864-87-0x0000000000000000-mapping.dmp
-
memory/1060-62-0x0000000000000000-mapping.dmp
-
memory/1060-68-0x00000000000C0000-0x00000000000E2000-memory.dmpFilesize
136KB
-
memory/1060-66-0x00000000000C0000-0x00000000000E2000-memory.dmpFilesize
136KB
-
memory/1060-64-0x0000000074861000-0x0000000074863000-memory.dmpFilesize
8KB
-
memory/1136-67-0x0000000000000000-mapping.dmp
-
memory/1448-69-0x0000000000000000-mapping.dmp
-
memory/1448-70-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmpFilesize
8KB
-
memory/1668-58-0x0000000000240000-0x0000000000262000-memory.dmpFilesize
136KB
-
memory/1668-65-0x0000000000240000-0x0000000000262000-memory.dmpFilesize
136KB
-
memory/1668-61-0x0000000000240000-0x0000000000262000-memory.dmpFilesize
136KB
-
memory/1668-60-0x0000000000AE0000-0x0000000000B12000-memory.dmpFilesize
200KB
-
memory/1668-59-0x0000000000240000-0x0000000000262000-memory.dmpFilesize
136KB
-
memory/1668-54-0x0000000000000000-mapping.dmp
-
memory/1668-57-0x0000000000240000-0x0000000000262000-memory.dmpFilesize
136KB
-
memory/1668-56-0x00000000002B0000-0x0000000000387000-memory.dmpFilesize
860KB
-
memory/1668-55-0x00000000764C1000-0x00000000764C3000-memory.dmpFilesize
8KB
-
memory/1944-81-0x0000000000000000-mapping.dmp
-
memory/1944-86-0x00000000000C0000-0x00000000000E2000-memory.dmpFilesize
136KB
-
memory/2024-85-0x0000000000000000-mapping.dmp