Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2022 14:05
Static task
static1
Behavioral task
behavioral1
Sample
019338921.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
019338921.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
01970422_890527.lnk
Resource
win7-20220812-en
General
-
Target
01970422_890527.lnk
-
Size
1KB
-
MD5
76390978f26d3c6d7f799257542796ce
-
SHA1
4d3efb8f9db9519160fe13f79ef5be1c041eed0e
-
SHA256
03160be7cb698e1684f47071cb441ff181ff299cb38429636d11542ba8d306ae
-
SHA512
8c6243c7a93974dbf1a6878fbb2ad89861a4b960fb5262ba6c0e6274f78fcf93c90e80d1f007b9a6e3deafd53969fffb8f2e66adfd0e10c19fe7f65e4c597779
Malware Config
Extracted
qakbot
403.694
obama186
1654596660
67.165.206.193:993
63.143.92.99:995
74.14.5.179:2222
182.191.92.203:995
197.89.8.51:443
89.101.97.139:443
86.97.9.190:443
124.40.244.115:2222
80.11.74.81:2222
41.215.153.104:995
179.100.20.32:32101
31.35.28.29:443
202.134.152.2:2222
109.12.111.14:443
93.48.80.198:995
120.150.218.241:995
41.38.167.179:995
177.94.57.126:32101
173.174.216.62:443
1.161.101.20:443
88.224.254.172:443
82.41.63.217:443
67.209.195.198:443
70.46.220.114:443
24.178.196.158:2222
39.44.213.68:995
84.241.8.23:32103
210.246.4.69:995
92.132.172.197:2222
91.177.173.10:995
217.128.122.65:2222
149.28.238.199:995
45.76.167.26:995
45.63.1.12:443
144.202.2.175:443
45.63.1.12:995
144.202.3.39:995
144.202.2.175:995
45.76.167.26:443
149.28.238.199:443
144.202.3.39:443
140.82.63.183:995
140.82.63.183:443
175.145.235.37:443
85.246.82.244:443
47.23.89.60:993
187.207.131.50:61202
176.67.56.94:443
148.64.96.100:443
140.82.49.12:443
76.70.9.169:2222
217.164.121.161:2222
72.27.33.160:443
108.60.213.141:443
104.34.212.7:32103
39.44.158.215:995
31.48.174.63:2078
75.99.168.194:61201
117.248.109.38:21
83.110.218.147:993
82.152.39.39:443
180.129.108.214:995
5.32.41.45:443
83.110.92.106:443
197.164.182.46:993
196.203.37.215:80
186.90.153.162:2222
37.186.54.254:995
89.211.179.247:2222
24.139.72.117:443
201.142.177.168:443
37.34.253.233:443
69.14.172.24:443
125.24.187.183:443
208.107.221.224:443
174.69.215.101:443
76.25.142.196:443
96.37.113.36:993
173.21.10.71:2222
73.151.236.31:443
45.46.53.140:2222
189.146.90.232:443
70.51.135.90:2222
190.252.242.69:443
201.145.165.25:443
47.157.227.70:443
72.252.157.93:993
177.205.155.85:443
72.252.157.93:995
187.251.132.144:22
40.134.246.185:995
24.55.67.176:443
79.80.80.29:2222
179.158.105.44:443
72.252.157.93:990
89.86.33.217:443
201.172.23.68:2222
102.182.232.3:995
177.156.191.231:443
39.49.96.122:995
94.36.193.176:2222
120.61.1.114:443
217.164.121.161:1194
39.41.29.200:995
86.195.158.178:2222
86.98.149.168:2222
1.161.101.20:995
124.109.35.32:995
172.115.177.204:2222
105.27.172.6:443
32.221.224.140:995
208.101.82.0:443
71.24.118.253:443
143.0.219.6:995
217.165.176.49:2222
90.120.65.153:2078
5.203.199.157:995
39.52.41.80:995
148.0.56.63:443
191.112.25.187:443
121.7.223.45:2222
47.156.131.10:443
177.209.202.242:2222
41.86.42.158:995
106.51.48.170:50001
41.84.229.240:443
94.71.169.212:995
111.125.245.116:995
78.101.193.241:6883
201.242.175.29:2222
38.70.253.226:2222
187.149.236.5:443
217.165.79.88:443
85.255.232.18:443
103.246.242.202:443
41.230.62.211:995
67.69.166.79:2222
42.228.224.249:2222
172.114.160.81:995
94.26.122.9:995
75.99.168.194:443
189.253.206.105:443
81.215.196.174:443
46.107.48.202:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Qhjoyvjzmjst = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Jpqfhem = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 5044 regsvr32.exe -
Drops file in System32 directory 4 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 20 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\6fc9d541 = 7a14e467ae89a62ab6a66f080b9aa8fdc5917d37b444ed9443b190839a5fdb0f0ee05f258fbc051055fe617275202e9a9e70c5e2368659be3dda08dc315c2712fe4147c86ae364c1c9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\5a56050f = 0ea0be072b2a3911de6c3204f33dae21ee77dea1bfcf5a122644df43faa94648a32e6d0ee0a9dfd593c6f21129d1658a6dededc52c72a81b1fde915f08f7f10e2e6bfbccd00dbf271c7e7f1c1e6df5b5238357a935f5d7dd3af65a23be4de6ce46a9ccad061f72aa17288b46062b0c48186cdc7bfc3030b9185270c4098070937088ef79dcea8753f4af758b37fdeb8beda461c39bb1ec8a57e5e53e9b6f91c1f0a17084f5afd0bbc8e41ce14fcbe7e2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\58172573 = 5244cb38c77cf762a95ac1ea64101cac1f5708154cb2b29c32a81302da5101ae1f8782255fe3ebc0eb97e0bb16a80b068b04f99ef72457ac638e6034a4a36e2704e958e00f084de7d7445cb8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\e2ea626a = 7d923bb9e86141d6176aa51ccebaf3c7e9fe33c27f43658853ba3fc164bc3a0c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\251f6af9 = 9d564c6e2b50bcd3873396976cc7c15291009eedd608777e353296321d771133d3035f0256a9d510ea12204445d6821ac1b638cfddd09874e3fa57042b00d506f3e304c2d65e80649fd09a092068e6c8ce7b93fcf5b4ad3305ee8136b70ded336d6cbc00c04bf03fe09469 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\6fc9d541 = 7a14f367ae89939ce363cad7f81970fdaa566ef5ce01c9a3fd069aad67d3606d88fc59472d4e68706f2a92b63ba0eeac141c3f5ad56aebd038c468197797d0303b15b083a24e0212d3bb43067dca889cefb74d93604b3cd0958f927bfef4 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\6fc9d541 = 7a14fa67ae89939ce363cb9dfd127affa35661f3820ac1a0f40d929bdc87a6cb190dd89d1c97faab0ec32f19d7173d691f989d623549b1e98379be6a77ae6b6256d525623cafd09ea07cc26eea42a146a3495c33a28dadac5f1c980456bfea19081084df6b6fb9 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\9da30d9c = 8b5cab8dae8c1c5455908ef9cb2d25d7d6cc060f3c7bb99ed2444ff4b6ad5874a67e67236acdd09fb419172e353426a869fad812e50306b76f1e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\1080bab7 = 8599c05fa226c45ed8b5f4fb39d5935388d542efebde90595cbe45 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\6fc9d541 = 7a14f367ae89939ce363cad7f81970fdaa566ef5ce01c9a0f50692ad67d3606d88fc59472d4e68706f2a92b63ba0eeac141c3f5ad56aebd038c468197797d0303b15b083a24e0212d3bb43067dca889cefb74d93604b3cd0958f927bfef4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Siufhyvneuea\e0ab4216 = 1cecece3f60e17ffaa5b8051b48528e9202d7e9d291a1438823fad explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeexplorer.exepid process 4960 rundll32.exe 4960 rundll32.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe 4836 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 4960 rundll32.exe 5044 regsvr32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
cmd.exerundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 4292 wrote to memory of 4896 4292 cmd.exe rundll32.exe PID 4292 wrote to memory of 4896 4292 cmd.exe rundll32.exe PID 4896 wrote to memory of 4960 4896 rundll32.exe rundll32.exe PID 4896 wrote to memory of 4960 4896 rundll32.exe rundll32.exe PID 4896 wrote to memory of 4960 4896 rundll32.exe rundll32.exe PID 4960 wrote to memory of 4836 4960 rundll32.exe explorer.exe PID 4960 wrote to memory of 4836 4960 rundll32.exe explorer.exe PID 4960 wrote to memory of 4836 4960 rundll32.exe explorer.exe PID 4960 wrote to memory of 4836 4960 rundll32.exe explorer.exe PID 4960 wrote to memory of 4836 4960 rundll32.exe explorer.exe PID 4836 wrote to memory of 1456 4836 explorer.exe schtasks.exe PID 4836 wrote to memory of 1456 4836 explorer.exe schtasks.exe PID 4836 wrote to memory of 1456 4836 explorer.exe schtasks.exe PID 3316 wrote to memory of 5044 3316 regsvr32.exe regsvr32.exe PID 3316 wrote to memory of 5044 3316 regsvr32.exe regsvr32.exe PID 3316 wrote to memory of 5044 3316 regsvr32.exe regsvr32.exe PID 5044 wrote to memory of 3880 5044 regsvr32.exe explorer.exe PID 5044 wrote to memory of 3880 5044 regsvr32.exe explorer.exe PID 5044 wrote to memory of 3880 5044 regsvr32.exe explorer.exe PID 5044 wrote to memory of 3880 5044 regsvr32.exe explorer.exe PID 5044 wrote to memory of 3880 5044 regsvr32.exe explorer.exe PID 3880 wrote to memory of 424 3880 explorer.exe reg.exe PID 3880 wrote to memory of 424 3880 explorer.exe reg.exe PID 3880 wrote to memory of 4496 3880 explorer.exe reg.exe PID 3880 wrote to memory of 4496 3880 explorer.exe reg.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\01970422_890527.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" 019338921.dll,DllInstall2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" 019338921.dll,DllInstall3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ljuhhvnpmp /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\019338921.dll\"" /SC ONCE /Z /ST 14:10 /ET 14:225⤵
- Creates scheduled task(s)
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\019338921.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\019338921.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Jpqfhem" /d "0"4⤵
- Windows security bypass
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Qhjoyvjzmjst" /d "0"4⤵
- Windows security bypass
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\019338921.dllFilesize
1.4MB
MD57bbeafc1ab9f9d1a48a99338ffec561c
SHA1a4ce6de223addbdc66e747d3abd00b9f190fb5cb
SHA256fca807ab91e7328195cafebe5761402f4d7066aef4c766c78a37f2c27fcf812c
SHA512a32b34d9c03b6a1eaa1d409968d6d211a22320cc8b46955f8cda156f4956ea4a3d2e6d0a5fd8578e274e67db36e2696a7e8722647313333d3b7825d3e3a2c263
-
C:\Users\Admin\AppData\Local\Temp\019338921.dllFilesize
1.4MB
MD57bbeafc1ab9f9d1a48a99338ffec561c
SHA1a4ce6de223addbdc66e747d3abd00b9f190fb5cb
SHA256fca807ab91e7328195cafebe5761402f4d7066aef4c766c78a37f2c27fcf812c
SHA512a32b34d9c03b6a1eaa1d409968d6d211a22320cc8b46955f8cda156f4956ea4a3d2e6d0a5fd8578e274e67db36e2696a7e8722647313333d3b7825d3e3a2c263
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/424-151-0x0000000000000000-mapping.dmp
-
memory/1456-139-0x0000000000000000-mapping.dmp
-
memory/3880-154-0x0000000000C00000-0x0000000000C22000-memory.dmpFilesize
136KB
-
memory/3880-153-0x0000000000C00000-0x0000000000C22000-memory.dmpFilesize
136KB
-
memory/3880-148-0x0000000000000000-mapping.dmp
-
memory/4496-152-0x0000000000000000-mapping.dmp
-
memory/4836-137-0x0000000000000000-mapping.dmp
-
memory/4836-141-0x0000000000550000-0x0000000000572000-memory.dmpFilesize
136KB
-
memory/4836-140-0x0000000000550000-0x0000000000572000-memory.dmpFilesize
136KB
-
memory/4896-132-0x0000000000000000-mapping.dmp
-
memory/4960-136-0x0000000002F40000-0x0000000002F62000-memory.dmpFilesize
136KB
-
memory/4960-138-0x0000000002F40000-0x0000000002F62000-memory.dmpFilesize
136KB
-
memory/4960-135-0x0000000002EF0000-0x0000000002F1D000-memory.dmpFilesize
180KB
-
memory/4960-134-0x0000000002F40000-0x0000000002F62000-memory.dmpFilesize
136KB
-
memory/4960-133-0x0000000000000000-mapping.dmp
-
memory/5044-146-0x0000000001B20000-0x0000000001B4D000-memory.dmpFilesize
180KB
-
memory/5044-147-0x0000000001B70000-0x0000000001B92000-memory.dmpFilesize
136KB
-
memory/5044-145-0x0000000001B70000-0x0000000001B92000-memory.dmpFilesize
136KB
-
memory/5044-150-0x0000000001B70000-0x0000000001B92000-memory.dmpFilesize
136KB
-
memory/5044-143-0x0000000000000000-mapping.dmp