Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
pimpled.dat.dll
Resource
win7-20220901-en
4 signatures
150 seconds
General
-
Target
pimpled.dat.dll
-
Size
638KB
-
MD5
19f11dfb3c7baec741a805a702ffd34e
-
SHA1
81844f0c82ec87a62746f4225f7b0110cafd68a8
-
SHA256
8f51c35eb0afafd2d29a2b68d1db0d700422d6dbc16ac2ff915e24eb8fb288bc
-
SHA512
f27e87774edca87f3f72e9ae9eeac9511f252873200d1efe546597f657b22e2809506af3a0281f040efbf752779ea7615df151f6d1c4538b892b37d9152fb68f
-
SSDEEP
12288:fa2sTwwDbozbuUijWQ2ieToMjavBAHuZXJMeGbX//IO:fBs1QuUijWHVUM++OZXJM5T//I
Malware Config
Extracted
Family
qakbot
Version
403.973
Botnet
BB02
Campaign
1665761649
C2
211.47.11.62:33850
Attributes
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4796 1116 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1116 rundll32.exe 1116 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 1116 744 rundll32.exe 83 PID 744 wrote to memory of 1116 744 rundll32.exe 83 PID 744 wrote to memory of 1116 744 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pimpled.dat.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\pimpled.dat.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 6683⤵
- Program crash
PID:4796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1116 -ip 11161⤵PID:4880