Overview
overview
10Static
static
LearnS.lnk
windows7-x64
3LearnS.lnk
windows10-2004-x64
3assaulting...ded.js
windows7-x64
3assaulting...ded.js
windows10-2004-x64
1assaulting/milt.dll
windows7-x64
10assaulting/milt.dll
windows10-2004-x64
10assaulting...ly.cmd
windows7-x64
1assaulting...ly.cmd
windows10-2004-x64
1Resubmissions
20-03-2024 20:50
240320-zmt8naag35 1013-10-2022 11:50
221013-nzp9pache4 1001-10-2022 01:58
221001-cd4peagcfn 10Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 01:58
Static task
static1
Behavioral task
behavioral1
Sample
LearnS.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
LearnS.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
assaulting/baronessSubsided.js
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
assaulting/baronessSubsided.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
assaulting/milt.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
assaulting/milt.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
assaulting/testifiersEquivalently.cmd
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
assaulting/testifiersEquivalently.cmd
Resource
win10v2004-20220812-en
General
-
Target
assaulting/milt.dll
-
Size
448KB
-
MD5
24c89f5383c6dca654f27383b1ec00a3
-
SHA1
7766a0a045e56fe16fb5b9e0c5d7c1d047eb36c6
-
SHA256
bb2540e27de2b8d3d154fee3efa8e2cbefdf25e5a1d76b4cedf49ac3917a1471
-
SHA512
58bffa71d6be31e136c220828ba0565a7e9231e363804beefc66f47653cf80af94bcc5c221444e6f7f1707dbe915279d67c77592ccedc2d5f09b29bc62f39eb3
-
SSDEEP
6144:NWlZhgoMdtBYTNSlWBsAOvbd62IYQ8jjHH62uzdMzD9699o9:cl3goMdrbdJ6wQ8faVO099o
Malware Config
Extracted
qakbot
75.116.87.44:14933
64.55.103.194:9151
80.214.68.88:40730
97.184.129.40:2118
216.44.143.70:26851
239.39.127.10:38876
57.33.10.57:17737
201.128.252.151:58865
211.76.239.250:34506
124.58.65.86:13247
41.8.154.58:7614
6.55.240.195:27003
139.242.121.12:23370
8.81.30.103:64297
168.13.24.67:37382
17.219.125.20:59669
136.66.66.194:40287
63.172.177.141:57252
195.44.25.26:29277
67.212.106.154:59890
149.254.111.67:39052
184.74.22.12:50436
166.33.149.229:19515
172.102.164.60:43562
155.28.49.2:51545
7.122.114.191:33775
220.68.130.196:7948
121.236.113.177:14197
47.2.191.47:32393
49.93.218.109:41033
174.124.34.188:14831
178.143.168.245:48707
159.196.166.193:58136
1.104.105.37:49572
225.108.223.250:46683
105.208.24.120:59473
180.179.25.125:42514
236.83.216.21:0
90.29.227.242:1085
212.204.93.86:48405
115.34.223.65:24926
250.151.244.173:3488
16.95.145.59:42025
50.6.212.181:17804
23.86.160.130:53103
212.133.85.240:62503
122.125.236.31:0
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
regsvr32.exewermgr.exepid process 1880 regsvr32.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe 2012 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 1880 regsvr32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1904 wrote to memory of 1880 1904 regsvr32.exe regsvr32.exe PID 1904 wrote to memory of 1880 1904 regsvr32.exe regsvr32.exe PID 1904 wrote to memory of 1880 1904 regsvr32.exe regsvr32.exe PID 1904 wrote to memory of 1880 1904 regsvr32.exe regsvr32.exe PID 1904 wrote to memory of 1880 1904 regsvr32.exe regsvr32.exe PID 1904 wrote to memory of 1880 1904 regsvr32.exe regsvr32.exe PID 1904 wrote to memory of 1880 1904 regsvr32.exe regsvr32.exe PID 1880 wrote to memory of 2012 1880 regsvr32.exe wermgr.exe PID 1880 wrote to memory of 2012 1880 regsvr32.exe wermgr.exe PID 1880 wrote to memory of 2012 1880 regsvr32.exe wermgr.exe PID 1880 wrote to memory of 2012 1880 regsvr32.exe wermgr.exe PID 1880 wrote to memory of 2012 1880 regsvr32.exe wermgr.exe PID 1880 wrote to memory of 2012 1880 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\assaulting\milt.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\assaulting\milt.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-