Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
D704DA175248D59C068D9251F96DEEB2.dll
Resource
win7-20220901-en
General
-
Target
D704DA175248D59C068D9251F96DEEB2.dll
-
Size
393KB
-
MD5
d704da175248d59c068d9251f96deeb2
-
SHA1
3c95b16e88c5edc3a7f24c0b7c78bf4312a82599
-
SHA256
d127e0c805be94fef708c47ad62037ba3840d7b1db5330deea2bc40160501f45
-
SHA512
21903bfd94beb1d7d88e3ff09e4727ac50c5f868633336173311d8033f3bbe19b01c1579cec4a7a660c9ee99aab1c8912986028ff450d3e693bc13008c835155
-
SSDEEP
6144:P57WEjEaG/tptUcHme85N6w0ZmXp8jwkGU99WOUN2LAOh:IEj7QPw5cwimXujH33
Malware Config
Extracted
qakbot
403.895
BB
1664437404
113.180.55.111:443
58.186.75.42:443
105.184.56.118:995
196.206.133.114:995
80.253.189.55:443
193.3.19.137:443
41.104.80.233:443
49.205.197.13:443
186.81.122.168:443
216.238.83.82:443
216.238.83.82:995
39.44.5.104:995
196.207.146.151:443
216.238.108.61:995
139.84.167.18:995
139.84.167.18:443
216.238.108.61:443
149.28.38.16:995
134.35.12.30:443
131.100.40.13:995
102.189.184.12:995
103.173.121.17:443
102.190.190.242:995
85.86.242.245:443
73.252.27.208:995
41.99.57.148:443
197.120.66.183:995
186.90.144.235:2222
197.49.45.244:995
186.50.137.148:995
181.177.156.209:443
177.45.78.52:993
86.196.181.62:2222
197.203.50.195:443
89.187.169.77:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 828 regsvr32.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe 2040 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 828 regsvr32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1324 wrote to memory of 828 1324 regsvr32.exe 27 PID 1324 wrote to memory of 828 1324 regsvr32.exe 27 PID 1324 wrote to memory of 828 1324 regsvr32.exe 27 PID 1324 wrote to memory of 828 1324 regsvr32.exe 27 PID 1324 wrote to memory of 828 1324 regsvr32.exe 27 PID 1324 wrote to memory of 828 1324 regsvr32.exe 27 PID 1324 wrote to memory of 828 1324 regsvr32.exe 27 PID 828 wrote to memory of 2040 828 regsvr32.exe 28 PID 828 wrote to memory of 2040 828 regsvr32.exe 28 PID 828 wrote to memory of 2040 828 regsvr32.exe 28 PID 828 wrote to memory of 2040 828 regsvr32.exe 28 PID 828 wrote to memory of 2040 828 regsvr32.exe 28 PID 828 wrote to memory of 2040 828 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\D704DA175248D59C068D9251F96DEEB2.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\D704DA175248D59C068D9251F96DEEB2.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-