Overview
overview
10Static
static
Postcards.lnk
windows7-x64
3Postcards.lnk
windows10-2004-x64
3plaid/croaks.dll
windows7-x64
10plaid/croaks.dll
windows10-2004-x64
10plaid/disb...hip.js
windows7-x64
3plaid/disb...hip.js
windows10-2004-x64
1plaid/flou...es.cmd
windows7-x64
1plaid/flou...es.cmd
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 10:38
Static task
static1
Behavioral task
behavioral1
Sample
Postcards.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Postcards.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
plaid/croaks.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
plaid/croaks.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
plaid/disbarredJudgeship.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
plaid/disbarredJudgeship.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
plaid/flounderingCores.cmd
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
plaid/flounderingCores.cmd
Resource
win10v2004-20220812-en
General
-
Target
plaid/croaks.dll
-
Size
594KB
-
MD5
3dc3f269b9a89b2d7ea8249d4644a900
-
SHA1
b9075c67730f2a0d3b65f07663f300cfaff19011
-
SHA256
af1692ced38f5fda305b35be66774822900a0b9617102db4b3da5f7c97f70e3e
-
SHA512
f1377d49c9ff7dde7bd138d38a097612298f4215aa8461b9e0fe748c238de577e8f4eb134428300961b1618e018c2e8c0128923f3e8f6cb8fd93738fb264ef89
-
SSDEEP
6144:sEUrgznbtvSaoyH0+iN4QDClgg9Q6STFOPHuC0AO+jZrR:CgzbVZi2QWig2MHuNyR
Malware Config
Extracted
qakbot
403.895
BB
1664437404
113.180.55.111:443
58.186.75.42:443
105.184.56.118:995
196.206.133.114:995
80.253.189.55:443
193.3.19.137:443
41.104.80.233:443
49.205.197.13:443
186.81.122.168:443
216.238.83.82:443
216.238.83.82:995
39.44.5.104:995
196.207.146.151:443
216.238.108.61:995
139.84.167.18:995
139.84.167.18:443
216.238.108.61:443
149.28.38.16:995
134.35.12.30:443
131.100.40.13:995
102.189.184.12:995
103.173.121.17:443
102.190.190.242:995
85.86.242.245:443
73.252.27.208:995
41.99.57.148:443
197.120.66.183:995
186.90.144.235:2222
197.49.45.244:995
186.50.137.148:995
181.177.156.209:443
177.45.78.52:993
86.196.181.62:2222
197.203.50.195:443
89.187.169.77:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
regsvr32.exewermgr.exepid process 1772 regsvr32.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe 1128 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 1772 regsvr32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1584 wrote to memory of 1772 1584 regsvr32.exe regsvr32.exe PID 1584 wrote to memory of 1772 1584 regsvr32.exe regsvr32.exe PID 1584 wrote to memory of 1772 1584 regsvr32.exe regsvr32.exe PID 1584 wrote to memory of 1772 1584 regsvr32.exe regsvr32.exe PID 1584 wrote to memory of 1772 1584 regsvr32.exe regsvr32.exe PID 1584 wrote to memory of 1772 1584 regsvr32.exe regsvr32.exe PID 1584 wrote to memory of 1772 1584 regsvr32.exe regsvr32.exe PID 1772 wrote to memory of 1128 1772 regsvr32.exe wermgr.exe PID 1772 wrote to memory of 1128 1772 regsvr32.exe wermgr.exe PID 1772 wrote to memory of 1128 1772 regsvr32.exe wermgr.exe PID 1772 wrote to memory of 1128 1772 regsvr32.exe wermgr.exe PID 1772 wrote to memory of 1128 1772 regsvr32.exe wermgr.exe PID 1772 wrote to memory of 1128 1772 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\plaid\croaks.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\plaid\croaks.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128