Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2022 17:49
Static task
static1
Behavioral task
behavioral1
Sample
3586/6190.cmd
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3586/6190.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
3586/extinct.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
3586/extinct.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Item.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Item.lnk
Resource
win10v2004-20220812-en
General
-
Target
3586/extinct.dll
-
Size
384KB
-
MD5
1fa2068f08d1c55f06d6c33cb846f9ad
-
SHA1
e305efe7987be1a91cdf39daa6bd1b19bc8c694c
-
SHA256
fd18b58235e50379b775cc3cbabdc8df599e71f787b2d286281999c24ecc18f8
-
SHA512
c2a2b84e2549be4078397650470f40d7f1b3c7385eab182e91ee2af09aea429c307b778d16e7b5673a10946485ef1db790d21878a4f752ed59e3061687898764
-
SSDEEP
6144:OwWNVNYHWRZMZeiVt5p682MkWgylrBeKd5bYBWzjCvIuwDJnpCKHbrxOG53KPNs:Ol5eWt82Mk6lroKsLguiHOPNs
Malware Config
Extracted
qakbot
254.220.133.175:61488
6.214.34.86:37718
129.63.87.139:47957
199.143.187.202:62342
233.203.75.113:40362
82.124.234.247:34892
77.88.220.108:65380
25.178.53.162:20183
234.205.153.76:63077
238.101.201.44:62063
244.41.89.118:54277
231.192.232.240:5182
13.173.166.131:1980
145.12.85.164:5864
13.198.107.186:24529
120.215.195.171:65347
193.162.253.134:2162
122.85.3.31:40483
50.116.208.51:18656
210.30.166.49:58465
153.82.223.80:52639
90.156.206.147:6480
248.255.3.157:36782
70.166.177.154:8582
80.52.240.184:39029
224.147.231.18:26231
201.254.148.88:2037
195.144.62.34:49877
188.64.131.241:4622
107.81.154.144:34441
237.206.212.29:56383
85.84.198.142:12295
97.135.164.94:41867
137.54.43.113:23074
235.219.178.212:22782
230.24.167.76:23622
240.14.116.14:19364
57.227.156.139:0
84.45.92.155:35924
230.175.205.20:24043
154.93.172.138:10659
61.169.210.127:33589
148.150.193.221:56754
131.161.227.172:2723
84.129.117.64:31596
195.232.207.127:65414
23.98.222.35:0
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 4740 regsvr32.exe 4740 regsvr32.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe 2228 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 4740 regsvr32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 4824 wrote to memory of 4740 4824 regsvr32.exe regsvr32.exe PID 4824 wrote to memory of 4740 4824 regsvr32.exe regsvr32.exe PID 4824 wrote to memory of 4740 4824 regsvr32.exe regsvr32.exe PID 4740 wrote to memory of 2228 4740 regsvr32.exe wermgr.exe PID 4740 wrote to memory of 2228 4740 regsvr32.exe wermgr.exe PID 4740 wrote to memory of 2228 4740 regsvr32.exe wermgr.exe PID 4740 wrote to memory of 2228 4740 regsvr32.exe wermgr.exe PID 4740 wrote to memory of 2228 4740 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3586\extinct.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3586\extinct.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228