Analysis
-
max time kernel
149s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
11-08-2022 08:16
Static task
static1
Behavioral task
behavioral1
Sample
0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll
Resource
win7-20220718-en
General
-
Target
0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll
-
Size
1.3MB
-
MD5
5db3fd7c47a60dd0dc5c9b9733ef3a28
-
SHA1
9c6bedc01368ebad082fcab4c5bf32cd6ccd17e7
-
SHA256
0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b
-
SHA512
b1845e18e16954032e34392bbeaef839bd991d7d4106e2467b20cdf01927ca3ed4191762b3d58739c5d901df06d2fe6a6c83abef5a0b63668fcd835bb1a69e99
Malware Config
Extracted
qakbot
403.690
AA
1653399733
1.161.104.31:443
47.156.131.10:443
201.172.23.68:2222
187.251.132.144:22
31.215.69.176:443
191.250.188.54:443
93.48.80.198:995
80.11.74.81:2222
38.70.253.226:2222
100.1.108.246:443
5.32.41.45:443
188.161.200.40:995
201.242.206.44:2222
208.107.221.224:443
47.23.89.60:993
75.99.168.194:443
103.246.242.202:443
200.148.9.225:32101
37.210.169.150:2222
79.129.121.68:995
72.252.157.93:995
40.134.246.185:995
37.186.54.254:995
191.34.192.119:443
187.16.64.193:2222
75.99.168.194:61201
39.49.71.247:995
24.139.72.117:443
24.55.67.176:443
89.86.33.217:443
74.14.5.179:2222
173.174.216.62:443
197.87.182.35:443
39.44.66.76:995
202.134.152.2:2222
41.38.167.179:995
92.132.172.197:2222
180.129.108.214:995
111.125.245.118:995
72.27.86.98:443
109.12.111.14:443
124.40.244.118:2222
217.128.122.65:2222
120.150.218.241:995
186.90.153.162:2222
106.51.48.170:50001
217.165.109.72:993
217.165.176.49:2222
32.221.224.140:995
70.46.220.114:443
46.107.48.202:443
172.114.160.81:995
2.50.4.57:443
24.178.196.158:2222
91.177.173.10:995
187.207.131.50:61202
144.202.2.175:995
144.202.3.39:443
149.28.238.199:995
149.28.238.199:443
144.202.2.175:443
45.63.1.12:443
45.63.1.12:995
45.76.167.26:443
148.0.15.41:443
140.82.63.183:443
144.202.3.39:995
45.76.167.26:995
140.82.63.183:995
182.191.92.203:995
117.248.109.38:21
41.84.246.126:443
82.152.39.39:443
90.120.65.153:2078
86.195.158.178:2222
81.129.112.49:2078
196.203.37.215:80
179.158.105.44:443
176.67.56.94:443
78.101.139.15:6883
108.60.213.141:443
37.34.253.233:443
140.82.49.12:443
67.209.195.198:443
148.64.96.100:443
102.182.232.3:995
45.241.160.25:993
217.164.120.195:1194
59.93.93.37:443
39.44.206.162:995
210.246.4.69:995
2.50.137.23:443
175.145.235.37:443
39.52.13.230:995
84.241.8.23:32103
217.164.120.195:2222
117.95.81.95:2222
69.14.172.24:443
41.215.148.84:995
179.145.13.69:32101
182.182.206.5:995
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
174.69.215.101:443
101.50.67.212:995
45.46.53.140:2222
187.172.219.103:443
190.252.242.69:443
85.246.82.244:443
47.157.227.70:443
189.223.134.157:443
189.146.87.77:443
187.208.122.226:443
79.80.80.29:2222
2.34.12.8:443
197.94.85.72:443
189.253.111.196:443
181.208.248.227:443
94.36.191.129:2222
78.176.207.168:443
103.116.178.85:995
121.7.223.250:2222
67.165.206.193:993
82.41.63.217:443
41.228.22.180:443
120.61.2.124:443
89.137.52.44:443
76.70.9.169:2222
72.66.116.235:995
125.168.47.127:2222
172.115.177.204:2222
72.76.94.99:443
70.51.138.133:2222
46.176.192.130:995
72.252.157.93:990
72.252.157.93:993
186.106.192.46:443
125.24.193.41:443
118.161.37.101:995
103.107.113.83:443
113.89.6.31:995
203.122.46.130:443
197.165.163.159:995
67.69.166.79:2222
81.215.196.174:443
63.143.92.99:995
68.204.7.158:443
185.249.85.164:443
5.193.138.70:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeexplorer.exepid process 336 rundll32.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe 1180 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 336 rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exedescription pid process target process PID 752 wrote to memory of 336 752 rundll32.exe rundll32.exe PID 752 wrote to memory of 336 752 rundll32.exe rundll32.exe PID 752 wrote to memory of 336 752 rundll32.exe rundll32.exe PID 752 wrote to memory of 336 752 rundll32.exe rundll32.exe PID 752 wrote to memory of 336 752 rundll32.exe rundll32.exe PID 752 wrote to memory of 336 752 rundll32.exe rundll32.exe PID 752 wrote to memory of 336 752 rundll32.exe rundll32.exe PID 336 wrote to memory of 1180 336 rundll32.exe explorer.exe PID 336 wrote to memory of 1180 336 rundll32.exe explorer.exe PID 336 wrote to memory of 1180 336 rundll32.exe explorer.exe PID 336 wrote to memory of 1180 336 rundll32.exe explorer.exe PID 336 wrote to memory of 1180 336 rundll32.exe explorer.exe PID 336 wrote to memory of 1180 336 rundll32.exe explorer.exe PID 1180 wrote to memory of 1708 1180 explorer.exe schtasks.exe PID 1180 wrote to memory of 1708 1180 explorer.exe schtasks.exe PID 1180 wrote to memory of 1708 1180 explorer.exe schtasks.exe PID 1180 wrote to memory of 1708 1180 explorer.exe schtasks.exe PID 468 wrote to memory of 1344 468 taskeng.exe regsvr32.exe PID 468 wrote to memory of 1344 468 taskeng.exe regsvr32.exe PID 468 wrote to memory of 1344 468 taskeng.exe regsvr32.exe PID 468 wrote to memory of 1344 468 taskeng.exe regsvr32.exe PID 468 wrote to memory of 1344 468 taskeng.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn engdlyulgx /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll\"" /SC ONCE /Z /ST 10:19 /ET 10:314⤵
- Creates scheduled task(s)
PID:1708
-
C:\Windows\system32\taskeng.exetaskeng.exe {52AC75C7-0548-4BCD-9517-673FCF7FAC90} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll"2⤵PID:1344
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll"3⤵PID:1828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b.dll
Filesize1.3MB
MD55db3fd7c47a60dd0dc5c9b9733ef3a28
SHA19c6bedc01368ebad082fcab4c5bf32cd6ccd17e7
SHA2560a4ac14725b88aff8573e7fe775b708cab956fd6c2c6a9c6bf41c76c58c85d5b
SHA512b1845e18e16954032e34392bbeaef839bd991d7d4106e2467b20cdf01927ca3ed4191762b3d58739c5d901df06d2fe6a6c83abef5a0b63668fcd835bb1a69e99