Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
CO.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CO.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
judicature/dubiosity.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
judicature/dubiosity.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
judicature/hairless.dll
Resource
win7-20220901-en
General
-
Target
judicature/hairless.dll
-
Size
1.6MB
-
MD5
57490539515131a2688d82aa9654cb60
-
SHA1
18f24301ece65c0991d3e060d35cee7cfa889aef
-
SHA256
6323aa2a52e8df5103593e4632835def5244d20b7de0e76ad0e67815891093d8
-
SHA512
25bf6d17e36c8279f2756a903b70e9abbaad5017ce309a52c0c7d64b2b22d7f557c00f99fd67b85f88d1e10f82cc109925fca4504c92963123e55449eb3c6bf1
-
SSDEEP
24576:hdOBKJGDcYOGm+FpvC04Rl3ZC499TlgxE29S3GcOk8YdSkQh:hs9dm+n60YZCZY3ZR8Ydkh
Malware Config
Extracted
qakbot
404.14
BB05
1667208557
174.77.209.5:443
187.0.1.74:23795
24.206.27.39:443
1.156.220.169:30723
156.216.39.119:995
58.186.75.42:443
1.156.197.160:30467
187.1.1.190:4844
186.18.210.16:443
1.181.56.171:771
90.165.109.4:2222
187.0.1.186:39742
87.57.13.215:443
187.0.1.207:52344
227.26.3.227:1
98.207.190.55:443
187.0.1.197:7017
188.49.56.189:443
102.156.160.115:443
187.0.1.24:17751
70.51.139.148:2222
187.0.1.109:34115
14.164.18.210:443
187.0.1.97:30597
205.161.22.189:443
187.0.1.151:54711
196.217.63.248:443
187.0.1.160:45243
66.37.239.222:443
24.207.97.40:443
187.0.1.59:24056
68.62.199.70:443
45.230.169.132:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4500 872 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 872 rundll32.exe 872 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4048 wrote to memory of 872 4048 rundll32.exe 81 PID 4048 wrote to memory of 872 4048 rundll32.exe 81 PID 4048 wrote to memory of 872 4048 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\judicature\hairless.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\judicature\hairless.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 7203⤵
- Program crash
PID:4500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 872 -ip 8721⤵PID:2388