Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20-12-2022 15:34
Behavioral task
behavioral1
Sample
c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll
Resource
win7-20220812-es
General
-
Target
c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll
-
Size
126KB
-
MD5
3ff9d9dbf8c7a6865faeb43188afa6b4
-
SHA1
ba88ec57e854982e1bb7dbe4239b41c4b2b8c6a4
-
SHA256
c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19
-
SHA512
53e12acbfb932e606e30b7c174729c88c98cf0a63e9ac0b03776098a2087f5f7397baf4edacfd29802c77b57132a9a959c5f1d4fd41862e326e709bdfe39a6ed
-
SSDEEP
3072:FV9GWm/WPuPuZji5rPSASJDgfMBTBfQIoMh:fm/WGPuZj83SJEfMBTBoIv
Malware Config
Extracted
qakbot
403.780
azd
1661969003
72.252.157.93:990
72.252.157.93:995
187.172.230.151:443
46.107.48.202:443
70.46.220.114:443
173.189.167.21:995
93.48.80.198:995
99.232.140.205:2222
89.211.179.14:2222
37.210.148.30:995
182.191.92.203:995
41.228.22.180:443
70.51.153.182:2222
47.180.172.159:443
47.23.89.61:993
173.21.10.71:2222
208.107.221.224:443
76.25.142.196:443
63.143.92.99:995
24.158.23.166:995
32.221.224.140:995
148.64.96.100:443
37.34.253.233:443
197.167.27.20:993
66.230.104.103:443
177.45.208.251:32101
24.139.72.117:443
63.143.92.99:443
120.150.218.241:995
24.55.67.176:443
217.165.77.134:995
5.81.177.28:2078
172.115.177.204:2222
104.34.212.7:32103
217.165.77.134:443
47.23.89.61:995
186.64.87.202:443
78.101.202.75:50010
24.178.196.158:2222
67.209.195.198:443
197.94.210.133:443
41.84.233.188:443
85.104.122.231:443
39.44.43.99:995
217.165.85.153:993
39.57.40.50:995
196.203.37.215:80
217.164.121.181:1194
197.89.12.193:443
1.161.70.129:995
121.7.223.38:2222
39.52.1.59:995
212.70.96.76:995
32.221.224.140:443
174.69.215.101:443
39.41.117.139:995
45.46.53.140:2222
47.180.84.164:443
81.193.30.90:443
100.38.242.113:995
179.158.103.236:443
111.125.245.116:995
39.49.45.146:995
47.156.129.52:443
117.248.109.38:21
118.172.249.102:443
118.163.113.140:443
188.136.218.20:61202
69.14.172.24:443
86.213.191.206:2078
176.45.233.14:995
82.41.63.217:443
67.69.166.79:2222
217.164.237.54:2222
100.38.242.113:443
120.61.3.17:443
101.50.90.44:995
217.128.122.65:2222
217.128.122.65:443
88.227.46.238:443
223.229.136.61:443
72.252.157.93:993
76.185.151.214:443
2.34.12.8:443
179.225.245.173:32101
157.51.47.233:50001
83.79.86.27:2222
109.12.111.14:443
151.38.39.7:2222
208.101.89.137:443
96.37.113.36:993
200.90.119.139:2222
39.53.181.164:995
31.215.98.74:443
98.50.153.207:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exepid process 5008 regsvr32.exe 5008 regsvr32.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe 4996 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 5008 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 4544 wrote to memory of 5008 4544 regsvr32.exe regsvr32.exe PID 4544 wrote to memory of 5008 4544 regsvr32.exe regsvr32.exe PID 4544 wrote to memory of 5008 4544 regsvr32.exe regsvr32.exe PID 5008 wrote to memory of 4996 5008 regsvr32.exe explorer.exe PID 5008 wrote to memory of 4996 5008 regsvr32.exe explorer.exe PID 5008 wrote to memory of 4996 5008 regsvr32.exe explorer.exe PID 5008 wrote to memory of 4996 5008 regsvr32.exe explorer.exe PID 5008 wrote to memory of 4996 5008 regsvr32.exe explorer.exe PID 4996 wrote to memory of 4644 4996 explorer.exe schtasks.exe PID 4996 wrote to memory of 4644 4996 explorer.exe schtasks.exe PID 4996 wrote to memory of 4644 4996 explorer.exe schtasks.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c6077ec7a088259558bc77dd0f0681a1c020d4feaa52a15bf056e5d1351b2b19.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 16:36 /tn shmgqrjo /ET 16:47 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAYwA2ADAANwA3AGUAYwA3AGEAMAA4ADgAMgA1ADkANQA1ADgAYgBjADcANwBkAGQAMABmADAANgA4ADEAYQAxAGMAMAAyADAAZAA0AGYAZQBhAGEANQAyAGEAMQA1AGIAZgAwADUANgBlADUAZAAxADMANQAxAGIAMgBiADEAOQAuAGQAbABsACIA" /SC ONCE4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4644-135-0x0000000000000000-mapping.dmp
-
memory/4996-133-0x0000000000000000-mapping.dmp
-
memory/4996-134-0x0000000000C20000-0x0000000000C42000-memory.dmpFilesize
136KB
-
memory/4996-136-0x0000000000C20000-0x0000000000C42000-memory.dmpFilesize
136KB
-
memory/5008-132-0x0000000000000000-mapping.dmp