Analysis
-
max time kernel
113s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
uncited.dat.dll
Resource
win7-20220812-en
General
-
Target
uncited.dat.dll
-
Size
638KB
-
MD5
7f1fc752865619dbe870ab5630e901d6
-
SHA1
43878660e33f52f22ed1de323f2c426870174dd7
-
SHA256
10afa9374deef0bc44fae6fc28be88c3999bb2410f07b7159dbd1882a94e9189
-
SHA512
f085bcb6e666324e9f3f6cf0a9d3fe353fe4d100669512d66d1fc10abb9e9addb0c798fbbd8207f77daaea72fcd057bf22e710d14cfd97f4d24fdf7513b968c7
-
SSDEEP
12288:fa2sTwwDbozbuUijWQ2ieToMjavBxHuZXJMeGbX//IO:fBs1QuUijWHVUM+HOZXJM5T//I
Malware Config
Extracted
qakbot
403.973
BB02
1665761649
211.47.11.62:33850
104.233.202.195:443
105.156.242.71:443
45.230.169.132:995
181.197.41.173:443
197.0.89.147:443
191.254.53.134:995
190.204.74.4:2222
46.185.147.165:443
190.26.159.133:995
177.205.74.14:2222
197.63.250.197:993
45.230.169.132:443
156.212.50.148:443
193.27.13.28:32100
190.200.10.82:2222
31.166.182.166:443
179.105.182.216:995
193.201.187.64:443
1.53.101.75:443
190.181.17.58:443
181.141.3.126:443
125.26.193.137:995
58.186.91.228:443
113.170.223.42:443
139.228.33.176:2222
167.58.235.5:443
41.98.236.210:443
220.123.29.76:443
163.182.177.80:443
186.139.116.78:443
58.186.75.42:443
93.156.96.171:443
187.198.8.241:443
189.243.187.76:443
197.94.79.39:443
102.189.242.128:995
105.154.60.233:995
156.146.55.173:2222
109.177.128.182:443
125.20.84.122:443
186.18.210.16:443
41.105.150.238:443
187.58.165.81:443
183.182.86.158:443
42.189.32.186:80
110.159.63.62:443
41.111.66.163:443
190.193.180.228:443
42.115.244.80:443
187.56.91.215:995
179.25.153.200:995
190.100.149.122:995
181.44.34.172:443
196.207.146.151:443
105.197.208.168:995
72.88.245.71:443
197.204.233.216:443
85.171.48.85:443
144.202.15.58:443
144.202.15.58:995
105.69.142.130:995
41.109.62.192:443
197.158.89.85:443
187.37.47.42:995
186.15.213.14:443
187.101.200.186:995
41.101.129.54:443
186.0.51.202:443
191.165.254.63:2222
181.30.225.9:443
41.141.239.223:995
102.187.59.86:995
41.230.147.223:443
181.128.21.133:443
102.158.17.105:443
105.108.80.229:443
41.107.209.163:443
196.235.137.166:443
148.213.109.165:995
186.86.212.138:443
118.216.99.232:443
41.99.208.154:443
23.225.104.250:443
186.18.77.99:443
186.188.96.197:443
41.96.120.232:443
105.108.189.56:443
79.100.58.254:443
180.65.194.65:443
196.65.255.151:995
156.174.26.63:443
85.110.133.32:443
41.101.200.226:443
45.227.251.167:2222
96.234.66.76:995
39.44.5.102:995
41.109.253.237:443
181.164.194.228:443
41.200.165.185:443
105.159.124.224:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2356 2108 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 rundll32.exe 2108 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2108 4756 rundll32.exe 81 PID 4756 wrote to memory of 2108 4756 rundll32.exe 81 PID 4756 wrote to memory of 2108 4756 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\uncited.dat.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\uncited.dat.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 6763⤵
- Program crash
PID:2356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2108 -ip 21081⤵PID:5000