Overview
overview
10Static
static
Accounting.lnk
windows7-x64
3Accounting.lnk
windows10-2004-x64
3maliciousl...na.dll
windows7-x64
10maliciousl...na.dll
windows10-2004-x64
10maliciousl...ss.cmd
windows7-x64
1maliciousl...ss.cmd
windows10-2004-x64
1maliciousl...tor.js
windows7-x64
3maliciousl...tor.js
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-09-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
Accounting.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Accounting.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
maliciously/argentina.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
maliciously/argentina.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
maliciously/massifsTorturousness.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
maliciously/massifsTorturousness.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
maliciously/undercutTestator.js
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
maliciously/undercutTestator.js
Resource
win10v2004-20220812-en
General
-
Target
maliciously/argentina.dll
-
Size
1.1MB
-
MD5
f533e6c66d8a458c97c2bd408757d481
-
SHA1
1e75151f247c76c7de272d20138aadb921323fba
-
SHA256
b7e432ebcbff1842f6639e6cc8ba2cca6a7ebe6374d40fda88b9de0fa920b225
-
SHA512
05bff106715af50eda60e2f9fe5347b6585ab53830d7bd7fb1a08820d87324cff770fd9e07f2d1273f2a461748a84a262f2060332a8961456e672c983aebbc62
-
SSDEEP
12288:hTNDT7Pi5+57H2VR2J4bi4XXkM6ZlPK9912W0TFz+L2AUn0jggyi5UT+QD1lNMAL:ZVPl57rJCnz6zTz+qAl5w9MA
Malware Config
Extracted
qakbot
403.895
BB
1664292185
212.102.56.47:443
189.189.89.32:443
85.245.143.94:443
110.238.39.214:443
185.233.79.238:995
85.94.178.73:995
193.3.19.137:443
193.254.32.156:443
154.237.49.4:995
41.104.77.244:443
181.206.46.7:443
186.16.163.94:443
75.71.96.226:995
179.111.23.186:32101
41.97.65.83:443
41.105.89.30:443
85.86.242.245:443
181.105.32.5:443
197.41.235.69:995
103.173.121.17:443
41.99.36.158:443
49.205.197.13:443
41.227.228.31:443
197.203.145.251:443
41.249.123.100:995
41.69.236.243:995
197.160.22.10:443
134.35.12.64:443
217.165.146.223:993
113.170.223.53:443
118.174.89.216:443
160.177.207.113:8443
41.107.112.236:995
105.96.207.25:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewermgr.exepid process 1088 rundll32.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe 948 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 1088 rundll32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1116 wrote to memory of 1088 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1088 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1088 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1088 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1088 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1088 1116 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1088 1116 rundll32.exe rundll32.exe PID 1088 wrote to memory of 948 1088 rundll32.exe wermgr.exe PID 1088 wrote to memory of 948 1088 rundll32.exe wermgr.exe PID 1088 wrote to memory of 948 1088 rundll32.exe wermgr.exe PID 1088 wrote to memory of 948 1088 rundll32.exe wermgr.exe PID 1088 wrote to memory of 948 1088 rundll32.exe wermgr.exe PID 1088 wrote to memory of 948 1088 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\maliciously\argentina.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\maliciously\argentina.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:948