Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
D704DA175248D59C068D9251F96DEEB2.dll
Resource
win7-20220901-en
General
-
Target
D704DA175248D59C068D9251F96DEEB2.dll
-
Size
393KB
-
MD5
d704da175248d59c068d9251f96deeb2
-
SHA1
3c95b16e88c5edc3a7f24c0b7c78bf4312a82599
-
SHA256
d127e0c805be94fef708c47ad62037ba3840d7b1db5330deea2bc40160501f45
-
SHA512
21903bfd94beb1d7d88e3ff09e4727ac50c5f868633336173311d8033f3bbe19b01c1579cec4a7a660c9ee99aab1c8912986028ff450d3e693bc13008c835155
-
SSDEEP
6144:P57WEjEaG/tptUcHme85N6w0ZmXp8jwkGU99WOUN2LAOh:IEj7QPw5cwimXujH33
Malware Config
Extracted
qakbot
403.895
BB
1664437404
113.180.55.111:443
58.186.75.42:443
105.184.56.118:995
196.206.133.114:995
80.253.189.55:443
193.3.19.137:443
41.104.80.233:443
49.205.197.13:443
186.81.122.168:443
216.238.83.82:443
216.238.83.82:995
39.44.5.104:995
196.207.146.151:443
216.238.108.61:995
139.84.167.18:995
139.84.167.18:443
216.238.108.61:443
149.28.38.16:995
134.35.12.30:443
131.100.40.13:995
102.189.184.12:995
103.173.121.17:443
102.190.190.242:995
85.86.242.245:443
73.252.27.208:995
41.99.57.148:443
197.120.66.183:995
186.90.144.235:2222
197.49.45.244:995
186.50.137.148:995
181.177.156.209:443
177.45.78.52:993
86.196.181.62:2222
197.203.50.195:443
89.187.169.77:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1040 regsvr32.exe 1040 regsvr32.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe 920 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1040 regsvr32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1040 4420 regsvr32.exe 79 PID 4420 wrote to memory of 1040 4420 regsvr32.exe 79 PID 4420 wrote to memory of 1040 4420 regsvr32.exe 79 PID 1040 wrote to memory of 920 1040 regsvr32.exe 82 PID 1040 wrote to memory of 920 1040 regsvr32.exe 82 PID 1040 wrote to memory of 920 1040 regsvr32.exe 82 PID 1040 wrote to memory of 920 1040 regsvr32.exe 82 PID 1040 wrote to memory of 920 1040 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\D704DA175248D59C068D9251F96DEEB2.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\D704DA175248D59C068D9251F96DEEB2.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-