Analysis
-
max time kernel
301s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-es -
resource tags
arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows -
submitted
20-12-2022 15:34
Behavioral task
behavioral1
Sample
c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll
Resource
win7-20220812-es
General
-
Target
c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll
-
Size
126KB
-
MD5
3ff9d9dbf8c7a6865faeb43188afa6b4
-
SHA1
ba88ec57e854982e1bb7dbe4239b41c4b2b8c6a4
-
SHA256
c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19
-
SHA512
53e12acbfb932e606e30b7c174729c88c98cf0a63e9ac0b03776098a2087f5f7397baf4edacfd29802c77b57132a9a959c5f1d4fd41862e326e709bdfe39a6ed
-
SSDEEP
3072:FV9GWm/WPuPuZji5rPSASJDgfMBTBfQIoMh:fm/WGPuZj83SJEfMBTBoIv
Malware Config
Extracted
qakbot
403.780
azd
1661969003
72.252.157.93:990
72.252.157.93:995
187.172.230.151:443
46.107.48.202:443
70.46.220.114:443
173.189.167.21:995
93.48.80.198:995
99.232.140.205:2222
89.211.179.14:2222
37.210.148.30:995
182.191.92.203:995
41.228.22.180:443
70.51.153.182:2222
47.180.172.159:443
47.23.89.61:993
173.21.10.71:2222
208.107.221.224:443
76.25.142.196:443
63.143.92.99:995
24.158.23.166:995
32.221.224.140:995
148.64.96.100:443
37.34.253.233:443
197.167.27.20:993
66.230.104.103:443
177.45.208.251:32101
24.139.72.117:443
63.143.92.99:443
120.150.218.241:995
24.55.67.176:443
217.165.77.134:995
5.81.177.28:2078
172.115.177.204:2222
104.34.212.7:32103
217.165.77.134:443
47.23.89.61:995
186.64.87.202:443
78.101.202.75:50010
24.178.196.158:2222
67.209.195.198:443
197.94.210.133:443
41.84.233.188:443
85.104.122.231:443
39.44.43.99:995
217.165.85.153:993
39.57.40.50:995
196.203.37.215:80
217.164.121.181:1194
197.89.12.193:443
1.161.70.129:995
121.7.223.38:2222
39.52.1.59:995
212.70.96.76:995
32.221.224.140:443
174.69.215.101:443
39.41.117.139:995
45.46.53.140:2222
47.180.84.164:443
81.193.30.90:443
100.38.242.113:995
179.158.103.236:443
111.125.245.116:995
39.49.45.146:995
47.156.129.52:443
117.248.109.38:21
118.172.249.102:443
118.163.113.140:443
188.136.218.20:61202
69.14.172.24:443
86.213.191.206:2078
176.45.233.14:995
82.41.63.217:443
67.69.166.79:2222
217.164.237.54:2222
100.38.242.113:443
120.61.3.17:443
101.50.90.44:995
217.128.122.65:2222
217.128.122.65:443
88.227.46.238:443
223.229.136.61:443
72.252.157.93:993
76.185.151.214:443
2.34.12.8:443
179.225.245.173:32101
157.51.47.233:50001
83.79.86.27:2222
109.12.111.14:443
151.38.39.7:2222
208.101.89.137:443
96.37.113.36:993
200.90.119.139:2222
39.53.181.164:995
31.215.98.74:443
98.50.153.207:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exepid process 1184 regsvr32.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe 1036 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 1184 regsvr32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1028 wrote to memory of 1184 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1184 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1184 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1184 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1184 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1184 1028 regsvr32.exe regsvr32.exe PID 1028 wrote to memory of 1184 1028 regsvr32.exe regsvr32.exe PID 1184 wrote to memory of 1036 1184 regsvr32.exe explorer.exe PID 1184 wrote to memory of 1036 1184 regsvr32.exe explorer.exe PID 1184 wrote to memory of 1036 1184 regsvr32.exe explorer.exe PID 1184 wrote to memory of 1036 1184 regsvr32.exe explorer.exe PID 1184 wrote to memory of 1036 1184 regsvr32.exe explorer.exe PID 1184 wrote to memory of 1036 1184 regsvr32.exe explorer.exe PID 1036 wrote to memory of 1468 1036 explorer.exe schtasks.exe PID 1036 wrote to memory of 1468 1036 explorer.exe schtasks.exe PID 1036 wrote to memory of 1468 1036 explorer.exe schtasks.exe PID 1036 wrote to memory of 1468 1036 explorer.exe schtasks.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 16:36 /tn anwwjukveu /ET 16:47 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAYwA2ADAANwA3AGUAYwA3AGEAMAA4ADgAMgA1ADkANQA1ADgAYgBjADcANwBkAGQAMABmADAANgA4ADEAYQAxAGMAMAAyADAAZAA0AGYAZQBhAGEANQAyAGEAMQA1AGIAZgAwADUANgBlADUAZAAxADMANQAxAGIAMgBiADEAOQAuAGQAbABsACIA" /SC ONCE4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1028-54-0x000007FEFC4A1000-0x000007FEFC4A3000-memory.dmpFilesize
8KB
-
memory/1036-57-0x0000000000000000-mapping.dmp
-
memory/1036-59-0x0000000074E91000-0x0000000074E93000-memory.dmpFilesize
8KB
-
memory/1036-60-0x00000000000D0000-0x00000000000F2000-memory.dmpFilesize
136KB
-
memory/1036-62-0x00000000000D0000-0x00000000000F2000-memory.dmpFilesize
136KB
-
memory/1184-55-0x0000000000000000-mapping.dmp
-
memory/1184-56-0x0000000076CE1000-0x0000000076CE3000-memory.dmpFilesize
8KB
-
memory/1468-61-0x0000000000000000-mapping.dmp