Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 01:00
Static task
static1
Behavioral task
behavioral1
Sample
1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dll
Resource
win7-20220414-en
General
-
Target
1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dll
-
Size
1.0MB
-
MD5
bc5cd9ba1b2f9df9617335a64ef4915f
-
SHA1
1630dd1cb577c44d3f9f28c06208f660c8d82aed
-
SHA256
1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e
-
SHA512
020798e77af15e8aafe1c69a115ebdfe51f3f4416d0a4ecb3a441f63c31d07a36f1b5d7d722db088f1508dc057b48e0d6284dcdc6efcddf464c75c83caa98dec
Malware Config
Extracted
qakbot
403.688
obama189
1655107308
91.177.173.10:995
117.248.109.38:21
182.191.92.203:995
39.52.38.164:995
217.165.84.253:993
84.241.8.23:32103
82.152.39.39:443
202.134.152.2:2222
122.118.131.132:995
120.150.218.241:995
222.169.71.98:2222
37.34.253.233:443
93.48.80.198:995
148.0.55.173:443
175.145.235.37:443
41.130.140.32:993
120.61.0.71:443
89.101.97.139:443
62.204.41.187:443
62.204.41.187:2222
62.204.41.187:61201
67.209.195.198:443
80.11.74.81:2222
92.132.172.197:2222
41.84.249.88:995
39.41.116.234:995
67.165.206.193:993
173.21.10.71:2222
148.64.96.100:443
172.115.177.204:2222
186.90.153.162:2222
32.221.224.140:995
108.60.213.141:443
63.143.92.99:995
24.43.99.75:443
174.69.215.101:443
85.101.222.204:443
76.25.142.196:443
39.44.146.220:995
5.32.41.45:443
1.161.123.53:995
74.14.5.179:2222
62.204.41.187:995
24.178.196.158:2222
83.110.92.106:443
86.97.9.190:443
41.228.22.180:443
38.70.253.226:2222
47.23.89.60:993
45.46.53.140:2222
82.41.63.217:443
173.174.216.62:443
189.223.102.22:443
69.14.172.24:443
102.182.232.3:995
86.97.247.161:1194
94.36.193.176:2222
200.100.126.210:32101
114.137.226.124:443
104.34.212.7:32103
41.38.167.179:995
37.210.156.247:2222
86.195.158.178:2222
187.149.236.5:443
201.172.23.68:2222
70.51.135.90:2222
77.200.155.99:443
191.112.21.157:443
179.158.105.44:443
125.24.187.231:443
180.129.108.214:995
39.44.235.10:995
109.228.220.196:443
39.49.82.115:995
58.105.167.36:50000
190.252.242.69:443
197.94.94.206:443
62.204.41.187:990
191.34.120.8:443
72.252.157.93:993
201.1.202.82:32101
187.207.131.50:61202
76.70.9.169:2222
62.204.41.187:80
62.204.41.187:2078
189.253.206.105:443
176.67.56.94:443
103.116.178.85:995
197.87.182.115:443
143.0.219.6:995
109.12.111.14:443
189.146.87.77:443
47.157.227.70:443
24.139.72.117:443
79.80.80.29:2222
187.189.168.121:22
193.136.1.58:443
37.186.54.96:995
40.134.246.185:995
90.120.209.197:2078
96.37.113.36:993
86.97.247.161:2222
37.208.135.172:6883
72.27.33.160:443
208.101.82.0:443
89.86.33.217:443
189.37.80.240:443
86.98.149.168:2222
103.207.85.38:995
71.24.118.253:443
217.165.176.49:2222
109.178.178.110:995
121.7.223.45:2222
47.156.131.10:443
177.209.202.242:2222
41.86.42.158:995
106.51.48.170:50001
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Xpqoueoqnke = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Waapnh = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 3056 regsvr32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1416 2760 WerFault.exe rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\2c3dc2e2 = 42907140a01319a662132a93cb6d3caa578f8e4bc6ef76675334f4aec7feb82beb966f2758ff8eb1de390c011c73967d2c8fd4428091816dd3ebf35a3615796ae32a07e4a3b71d3ae56f51a3d77f71715e9120ba61f22640a564f008ca07b67c669048e3b96b68 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\9481a587 = 07966963f306160fb0e44bd974ce39401415b725a9a1a69cc58d2b9891aced94085856da2b4ed6af58375ba64f4c4701272a4f1c7ee5bb4190e4cb877e53e02385d6677f50b0424e405ffcbb265d6da9430caacd944a507750d1736bbf4f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\e989ea0d = 464e4b505bf86114929e2bb02d69a8a3350fbc91f815d97bd387fceeb666b7f5692e57ad744588c5cb0ba954f19eb6646dac839a48 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\1be332d0 = 413258a709ac75b728b96e632f071a16be4ce8b503dc8b5a63570b3309afc0d50cedac3929 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\1be332d0 = 41324fa709ac40f3cb24455c2d040f86 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\2e7ce29e = f6f116898a49201764e26cfd73bb9ffc54d4e8a50ab7615ba2dbba7ffd008331dcdf98896b4871e38ecf2e43299bed92a5a26d8a34f4bd1ed336efb0e1661af87c12d2aa6da72f23be7b5614ea8e467d0460efa0cd39e4ac08ceba9fd7ec536c9a59079f4190bb6c5d629184b2e7241f74c9b9aaeadc60419f155f47e0c798ab18bd38f036b8dff86aecbbd0fb3ae95dfb27580b6997bf5f3f8f26ddb4a5eb7feb8d95b5b61eee64d5b202f546635b2eef04b981ebf610c513f4a08a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\51358d68 = b82e37024aadca5de9ff7656961ffde4f277b38ef64fbc9bc973fcd97b3837f96ecdbad9ee3eb8d68e15286055baac2c606930cf5a203795169f00b302c73d536407e0203f15e5da63d959ba81b72fda04faa36651dd1005b4ef44bdb95cd25acb222235526b8fa90cf7072f3261b069 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\96c085fb = a9303e7fb71ef18ac8a94052719f4df48b9068085c0e4cec83209cb09141031c42b727ece5bd87742bceeab053db98fc7c9f0acd73a53c499bbf47303056cfed458b0f9f5c52047dc08816efa40692a6b00202c5a9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ouypfyaew\64aa5d26 = b24cd8bb702f38fc46297ddf3ba00be64a12cb322af6ae2c3e8c58d9982720b9e3e866fe326fb6a9 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeexplorer.exepid process 2760 rundll32.exe 2760 rundll32.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe 4628 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 2760 rundll32.exe 3056 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 4400 wrote to memory of 2760 4400 rundll32.exe rundll32.exe PID 4400 wrote to memory of 2760 4400 rundll32.exe rundll32.exe PID 4400 wrote to memory of 2760 4400 rundll32.exe rundll32.exe PID 2760 wrote to memory of 4628 2760 rundll32.exe explorer.exe PID 2760 wrote to memory of 4628 2760 rundll32.exe explorer.exe PID 2760 wrote to memory of 4628 2760 rundll32.exe explorer.exe PID 2760 wrote to memory of 4628 2760 rundll32.exe explorer.exe PID 2760 wrote to memory of 4628 2760 rundll32.exe explorer.exe PID 4628 wrote to memory of 812 4628 explorer.exe schtasks.exe PID 4628 wrote to memory of 812 4628 explorer.exe schtasks.exe PID 4628 wrote to memory of 812 4628 explorer.exe schtasks.exe PID 3216 wrote to memory of 3056 3216 regsvr32.exe regsvr32.exe PID 3216 wrote to memory of 3056 3216 regsvr32.exe regsvr32.exe PID 3216 wrote to memory of 3056 3216 regsvr32.exe regsvr32.exe PID 3056 wrote to memory of 1768 3056 regsvr32.exe explorer.exe PID 3056 wrote to memory of 1768 3056 regsvr32.exe explorer.exe PID 3056 wrote to memory of 1768 3056 regsvr32.exe explorer.exe PID 3056 wrote to memory of 1768 3056 regsvr32.exe explorer.exe PID 3056 wrote to memory of 1768 3056 regsvr32.exe explorer.exe PID 1768 wrote to memory of 1756 1768 explorer.exe reg.exe PID 1768 wrote to memory of 1756 1768 explorer.exe reg.exe PID 1768 wrote to memory of 4856 1768 explorer.exe reg.exe PID 1768 wrote to memory of 4856 1768 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn gyelqakgjt /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dll\"" /SC ONCE /Z /ST 03:02 /ET 03:144⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 8083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2760 -ip 27601⤵
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Waapnh" /d "0"4⤵
- Windows security bypass
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Xpqoueoqnke" /d "0"4⤵
- Windows security bypass
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dllFilesize
1.0MB
MD5bc5cd9ba1b2f9df9617335a64ef4915f
SHA11630dd1cb577c44d3f9f28c06208f660c8d82aed
SHA2561b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e
SHA512020798e77af15e8aafe1c69a115ebdfe51f3f4416d0a4ecb3a441f63c31d07a36f1b5d7d722db088f1508dc057b48e0d6284dcdc6efcddf464c75c83caa98dec
-
C:\Users\Admin\AppData\Local\Temp\1b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e.dllFilesize
1.0MB
MD5bc5cd9ba1b2f9df9617335a64ef4915f
SHA11630dd1cb577c44d3f9f28c06208f660c8d82aed
SHA2561b3fc9c250b8cf0e52c491376aaa6c1929c3b5e264d59ed77033ee0214bc3f9e
SHA512020798e77af15e8aafe1c69a115ebdfe51f3f4416d0a4ecb3a441f63c31d07a36f1b5d7d722db088f1508dc057b48e0d6284dcdc6efcddf464c75c83caa98dec
-
memory/812-137-0x0000000000000000-mapping.dmp
-
memory/1756-147-0x0000000000000000-mapping.dmp
-
memory/1768-145-0x0000000000000000-mapping.dmp
-
memory/1768-150-0x00000000007C0000-0x00000000007E2000-memory.dmpFilesize
136KB
-
memory/1768-149-0x00000000007C0000-0x00000000007E2000-memory.dmpFilesize
136KB
-
memory/2760-131-0x0000000004600000-0x0000000004622000-memory.dmpFilesize
136KB
-
memory/2760-132-0x00000000045A0000-0x00000000045D2000-memory.dmpFilesize
200KB
-
memory/2760-133-0x0000000004600000-0x0000000004622000-memory.dmpFilesize
136KB
-
memory/2760-136-0x0000000004600000-0x0000000004622000-memory.dmpFilesize
136KB
-
memory/2760-130-0x0000000000000000-mapping.dmp
-
memory/3056-140-0x0000000000000000-mapping.dmp
-
memory/3056-143-0x0000000002C90000-0x0000000002CC2000-memory.dmpFilesize
200KB
-
memory/3056-144-0x0000000002CF0000-0x0000000002D12000-memory.dmpFilesize
136KB
-
memory/3056-142-0x0000000002CF0000-0x0000000002D12000-memory.dmpFilesize
136KB
-
memory/3056-146-0x0000000002CF0000-0x0000000002D12000-memory.dmpFilesize
136KB
-
memory/4628-138-0x0000000000B10000-0x0000000000B32000-memory.dmpFilesize
136KB
-
memory/4628-135-0x0000000000B10000-0x0000000000B32000-memory.dmpFilesize
136KB
-
memory/4628-134-0x0000000000000000-mapping.dmp
-
memory/4856-148-0x0000000000000000-mapping.dmp