Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 03:38
Static task
static1
Behavioral task
behavioral1
Sample
484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dll
Resource
win7-20220414-en
General
-
Target
484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dll
-
Size
408KB
-
MD5
b4e811abbbf0d4bd450c770060711e03
-
SHA1
6992cf181ce54ef41b02d5c376f3e947dd763699
-
SHA256
484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69
-
SHA512
c3ff11834cb6a45a687a616905c133ed2f6ed2db7fe1d8619c7cafa356ae20b1714ac5cf758a30ee1b731902db3fff7057f0d55058fc54017b72bc0557cba592
Malware Config
Extracted
qakbot
403.549
gml01
1647501143
76.69.155.202:2222
75.99.168.194:443
129.208.30.2:995
93.48.80.198:995
108.60.213.141:443
176.67.56.94:443
148.64.96.100:443
47.180.172.159:443
47.51.47.182:995
2.42.176.91:443
140.82.49.12:443
197.167.5.180:993
131.154.102.171:32100
86.195.158.178:2222
114.79.148.170:443
201.176.1.223:995
217.165.79.31:443
24.43.99.75:443
5.32.41.45:443
180.129.97.57:995
77.211.24.73:995
105.186.127.127:995
103.139.242.30:990
173.174.216.62:443
37.186.54.166:995
207.170.238.231:443
47.23.89.62:993
208.107.221.224:443
103.88.226.82:443
39.41.189.204:995
45.9.20.200:443
144.202.2.175:995
140.82.63.183:995
144.202.3.39:995
45.76.167.26:995
149.28.238.199:995
140.82.63.183:443
149.28.238.199:443
144.202.3.39:443
45.63.1.12:995
45.76.167.26:443
45.63.1.12:443
144.202.2.175:443
71.13.93.154:2222
75.99.168.194:61201
217.165.79.31:995
1.161.80.70:995
47.23.89.62:995
70.57.207.83:443
76.70.9.169:2222
31.35.28.29:443
69.159.200.138:2222
88.250.126.28:443
32.221.225.247:995
40.134.247.125:995
180.233.150.134:995
186.10.247.110:443
190.206.211.182:443
172.115.177.204:2222
110.143.139.163:443
70.46.220.114:443
86.98.27.253:443
117.248.109.38:21
38.70.253.226:2222
47.180.172.159:50010
86.98.8.203:995
75.159.9.236:443
72.76.94.99:443
172.114.160.81:995
125.25.6.23:443
58.105.167.35:50000
175.145.235.37:443
189.146.51.56:443
103.87.95.131:2222
174.69.215.101:443
197.89.8.135:443
67.209.195.198:443
91.177.173.10:995
78.100.194.196:6883
41.228.22.180:443
217.128.122.65:2222
39.52.45.169:993
76.169.147.192:32103
24.152.219.253:995
78.100.227.241:2222
195.32.57.18:80
92.99.229.158:2222
92.177.45.46:2078
177.207.108.236:993
45.239.129.13:443
120.150.218.241:995
76.25.142.196:443
39.52.45.169:995
75.188.35.168:443
217.165.109.52:993
39.44.151.33:995
74.15.2.252:2222
206.217.0.154:995
209.180.70.25:443
190.73.3.148:2222
128.106.122.216:443
182.191.92.203:995
67.165.206.193:993
121.74.187.191:995
173.21.10.71:2222
41.13.131.18:443
189.253.32.61:995
73.151.236.31:443
76.23.237.163:995
111.220.71.173:443
71.74.12.34:443
201.172.31.135:2222
201.170.181.247:443
148.64.96.100:993
201.145.160.158:443
189.237.6.251:443
161.142.48.212:443
201.103.6.221:443
47.156.191.217:443
103.211.39.220:465
82.51.28.59:995
72.252.201.34:995
79.167.209.26:995
72.252.201.34:990
177.207.108.236:995
63.143.92.99:995
105.226.9.8:995
70.51.135.39:2222
72.12.115.90:22
208.101.87.135:443
100.1.108.246:443
64.121.139.28:443
45.46.53.140:2222
24.55.67.176:443
24.229.150.54:995
86.198.170.170:2222
108.4.67.252:443
201.22.44.214:443
76.106.248.8:32103
41.84.248.120:995
86.97.8.111:443
109.12.111.14:443
5.81.177.71:2078
191.99.191.28:443
89.86.33.217:443
82.152.39.39:443
31.215.116.39:2222
191.112.22.95:443
72.66.116.235:995
80.11.74.81:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Gwsylz = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Mnoidg = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4388 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\20255849 = 427a55a2def12ae6c8163feaca192eeb07bc32538a87bad9db10b449f84e92f3ed17857762d2f5f02de11adffc9a6cbe7e672097fceedaf23e7c3f0bb5f2a0a9b785640b4f33fc2d4d8912f8c31240ec41fd37747aa3dc75218d2cc25db0f42630c0ab0473e2a48653d277 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\15ba8807 = 5878b3185d6f92791b34a0270339682049476e370f4c5149ddff4f44fe93d6e6ee819e5f0c6f75e119dc89d921c8624c067de08780785133ac444329965806064dc4a1bfe515ebbe8d0edd095d063ff5d2022a201d0766bc2fbf215deb9d33ddada2757ae156b0abff797a8e08a2052c91df413057a2c7049de21a2049169788eb9b327485e42bd0d365e5fd8a772eff3fde22dda8d098dcb6f4ce3bbc3cf9b7a4d21583a2bebecbc00f793b2b42bbd9c042ac6cba2a9152f86318a9db3f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\af47cf1e = ffced7cf44b8c0066660ff5f437bfeff394c69ef83c2fb32b28b773372f879400a183611553cc1f02cf5676616d2ce99b27994fb5a7b27f3e78f0f634ebce864e3e81f3d720c7c22d6592e91199964db0b30ededa627980a1062fe08fecb44 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\ad06ef62 = e60465f4058a57cba9d451ce81eade82055fd610d57c50e4b18bab4e12202f186de3f16d2e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\17fba87b = 03c1b27632fcf300b6554a1d74ed09938a3c16bbaa713c55316699c05b4d66c714b93d6b827f41f1883d5bdb3047326d4ff62addfb2637804cd6c68259c7eda705249b3d319096c0f03dd7369e383670a802f68c8f5f6edbe7d26238a34b074045c16be3dc explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\d24f8094 = 0bbe19b3f44b7bd135e4f7be58ddedf7b7a45078ab64382606af9d211245191b90ab9ba0b348662f08e423d5588f3eee31e953c85e50f3db8dbf7715bdb8a06d8d1f4359ce9087c9f0d7bc5a9a7839a7ef explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\6af3e7f1 = 406cd7e2912b9190c2793f688b253749102cc71d4cd1d2cf430b037c8610d84d9b3dfa98c86f1887f87d6f28c1692442ec9cc65a08c91744ec3f4b1c4af26e05d8815cf2efdf1664fb03ef7328ea22f90b269a1f9aed6ce8d485e067f785278cd527d6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\5f6c37bf = 92f29855c1e220bf28a352358d3c7a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yuoxcxspofhe\20255849 = 427a42a2def11fc8701a90e687e0fd54f512d2d6eb48da435953a1acd8895b7967df8b2854dbce10a2f1df259803270f951796201ee254ac2fe499669f49471c2814731a50f0b21a03a5f837473cbb8166ace25cba0e2250dde0f97b1061acd650c3b0e9787e1ca21901047440630d5aa897005b98458cc9e01f52b58eb79a6e explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exepid process 1152 regsvr32.exe 1152 regsvr32.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1152 regsvr32.exe 4388 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 400 wrote to memory of 1152 400 regsvr32.exe regsvr32.exe PID 400 wrote to memory of 1152 400 regsvr32.exe regsvr32.exe PID 400 wrote to memory of 1152 400 regsvr32.exe regsvr32.exe PID 1152 wrote to memory of 1936 1152 regsvr32.exe explorer.exe PID 1152 wrote to memory of 1936 1152 regsvr32.exe explorer.exe PID 1152 wrote to memory of 1936 1152 regsvr32.exe explorer.exe PID 1152 wrote to memory of 1936 1152 regsvr32.exe explorer.exe PID 1152 wrote to memory of 1936 1152 regsvr32.exe explorer.exe PID 1936 wrote to memory of 2968 1936 explorer.exe schtasks.exe PID 1936 wrote to memory of 2968 1936 explorer.exe schtasks.exe PID 1936 wrote to memory of 2968 1936 explorer.exe schtasks.exe PID 4488 wrote to memory of 4388 4488 regsvr32.exe regsvr32.exe PID 4488 wrote to memory of 4388 4488 regsvr32.exe regsvr32.exe PID 4488 wrote to memory of 4388 4488 regsvr32.exe regsvr32.exe PID 4388 wrote to memory of 4456 4388 regsvr32.exe explorer.exe PID 4388 wrote to memory of 4456 4388 regsvr32.exe explorer.exe PID 4388 wrote to memory of 4456 4388 regsvr32.exe explorer.exe PID 4388 wrote to memory of 4456 4388 regsvr32.exe explorer.exe PID 4388 wrote to memory of 4456 4388 regsvr32.exe explorer.exe PID 4456 wrote to memory of 1760 4456 explorer.exe reg.exe PID 4456 wrote to memory of 1760 4456 explorer.exe reg.exe PID 4456 wrote to memory of 3440 4456 explorer.exe reg.exe PID 4456 wrote to memory of 3440 4456 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dll1⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn rmwvwuz /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dll\"" /SC ONCE /Z /ST 07:28 /ET 07:404⤵
- Creates scheduled task(s)
PID:2968
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Gwsylz" /d "0"4⤵
- Windows security bypass
PID:1760 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Mnoidg" /d "0"4⤵
- Windows security bypass
PID:3440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dllFilesize
408KB
MD5b4e811abbbf0d4bd450c770060711e03
SHA16992cf181ce54ef41b02d5c376f3e947dd763699
SHA256484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69
SHA512c3ff11834cb6a45a687a616905c133ed2f6ed2db7fe1d8619c7cafa356ae20b1714ac5cf758a30ee1b731902db3fff7057f0d55058fc54017b72bc0557cba592
-
C:\Users\Admin\AppData\Local\Temp\484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69.dllFilesize
408KB
MD5b4e811abbbf0d4bd450c770060711e03
SHA16992cf181ce54ef41b02d5c376f3e947dd763699
SHA256484aa7139e61f466aadc3bfbfafb19c9b0b46753431eec1dd00c7cec27231f69
SHA512c3ff11834cb6a45a687a616905c133ed2f6ed2db7fe1d8619c7cafa356ae20b1714ac5cf758a30ee1b731902db3fff7057f0d55058fc54017b72bc0557cba592
-
memory/1152-130-0x0000000000000000-mapping.dmp
-
memory/1760-140-0x0000000000000000-mapping.dmp
-
memory/1936-131-0x0000000000000000-mapping.dmp
-
memory/1936-133-0x0000000001390000-0x00000000013FC000-memory.dmpFilesize
432KB
-
memory/1936-134-0x0000000001390000-0x00000000013FC000-memory.dmpFilesize
432KB
-
memory/2968-132-0x0000000000000000-mapping.dmp
-
memory/3440-141-0x0000000000000000-mapping.dmp
-
memory/4388-136-0x0000000000000000-mapping.dmp
-
memory/4456-138-0x0000000000000000-mapping.dmp
-
memory/4456-139-0x0000000000740000-0x00000000007AC000-memory.dmpFilesize
432KB