Overview
overview
10Static
static
Postcards.lnk
windows7-x64
3Postcards.lnk
windows10-2004-x64
3plaid/handouts.dll
windows7-x64
10plaid/handouts.dll
windows10-2004-x64
10plaid/quic...ly.cmd
windows7-x64
1plaid/quic...ly.cmd
windows10-2004-x64
1plaid/unfa...olo.js
windows7-x64
3plaid/unfa...olo.js
windows10-2004-x64
1Analysis
-
max time kernel
106s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/09/2022, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
Postcards.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Postcards.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
plaid/handouts.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
plaid/handouts.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
plaid/quickensFairly.cmd
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
plaid/quickensFairly.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
plaid/unfastenerPolo.js
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
plaid/unfastenerPolo.js
Resource
win10v2004-20220812-en
General
-
Target
plaid/handouts.dll
-
Size
336KB
-
MD5
d436df7179db1a851d7a74b68ae072b4
-
SHA1
f2bbce952c21e72c979cb9115a588a3dd22396cb
-
SHA256
e07f8ef4cdd69603a4ec2a21524b1236724cad1f3dd527ade09cbdb4b9cb74ef
-
SHA512
d71a94329b4250013bf9c5bf9e5373a220d9dc51a97e14ec947b242b048264b09aece6832239edd151d33bf698ebf84dae4c50dfb83af199b6dde0b20a9f893a
-
SSDEEP
6144:Ss07Ns6Fpqn3Kn/NjAOyme85N6w0ZmXp8jwkGU99WOUNeliVNYK:0Ns6LjjAw5cwimXujHxiVNYK
Malware Config
Extracted
qakbot
403.895
BB
1664437404
113.180.55.111:443
58.186.75.42:443
105.184.56.118:995
196.206.133.114:995
80.253.189.55:443
193.3.19.137:443
41.104.80.233:443
49.205.197.13:443
186.81.122.168:443
216.238.83.82:443
216.238.83.82:995
39.44.5.104:995
196.207.146.151:443
216.238.108.61:995
139.84.167.18:995
139.84.167.18:443
216.238.108.61:443
149.28.38.16:995
134.35.12.30:443
131.100.40.13:995
102.189.184.12:995
103.173.121.17:443
102.190.190.242:995
85.86.242.245:443
73.252.27.208:995
41.99.57.148:443
197.120.66.183:995
186.90.144.235:2222
197.49.45.244:995
186.50.137.148:995
181.177.156.209:443
177.45.78.52:993
86.196.181.62:2222
197.203.50.195:443
89.187.169.77:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 896 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 896 1964 regsvr32.exe 28 PID 1964 wrote to memory of 896 1964 regsvr32.exe 28 PID 1964 wrote to memory of 896 1964 regsvr32.exe 28 PID 1964 wrote to memory of 896 1964 regsvr32.exe 28 PID 1964 wrote to memory of 896 1964 regsvr32.exe 28 PID 1964 wrote to memory of 896 1964 regsvr32.exe 28 PID 1964 wrote to memory of 896 1964 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\plaid\handouts.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\plaid\handouts.dll2⤵
- Suspicious behavior: EnumeratesProcesses
PID:896
-