Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
r.dll
Resource
win7-20221111-en
General
-
Target
r.dll
-
Size
1.7MB
-
MD5
69db4be25c1611c17e00603c6aa2e8bb
-
SHA1
4044d9b57187ff5179f0d4cc51e849de57c73ded
-
SHA256
f084d87078a1e4b0ee208539c53e4853a52b5698e98f0578d7c12948e3831a68
-
SHA512
1fb9df575228442f941f5c568a105f4305f046229b3f076691d87ef7bd7f88d3e0ba2906d67d3dc8a6fa724b7e89186d979381de24dd48752313a1c958280418
-
SSDEEP
24576:nrj3nPW3ednWPiT8VTBqcATV8KIyydLXGcq8z+0uaEYmgE7v99de7:f3nCeCiT8aHxyM18z+XatEh9de
Malware Config
Extracted
qakbot
404.432
BB12
1675417198
12.172.173.82:995
12.172.173.82:2087
50.68.204.71:443
84.215.202.22:443
98.175.176.254:995
184.155.91.69:443
50.68.186.195:443
183.87.163.165:443
172.248.42.122:443
93.156.100.20:443
102.156.32.143:443
50.60.157.175:995
75.143.236.149:443
69.133.162.35:443
105.184.159.165:995
130.43.172.217:2222
82.36.36.76:443
73.223.248.31:443
202.142.98.62:443
73.161.176.218:443
109.149.147.148:2222
190.199.188.186:2222
67.10.175.47:2222
176.142.207.63:443
208.187.122.74:443
87.221.197.113:2222
2.14.144.105:2222
31.53.29.161:2222
27.109.19.90:2078
213.31.90.183:2222
78.130.215.67:443
82.127.204.82:2222
91.231.173.199:995
71.52.53.166:443
161.142.104.187:995
86.207.227.152:2222
213.67.255.57:2222
82.121.195.187:2222
180.158.187.35:995
89.129.109.27:2222
37.14.229.220:2222
12.172.173.82:50001
83.7.52.16:443
47.61.70.188:2078
173.76.49.61:443
24.64.112.40:2222
47.21.51.138:995
58.247.115.126:995
175.139.129.94:2222
116.75.63.125:443
116.72.250.18:443
86.96.72.139:2222
66.191.69.18:995
102.159.99.116:443
92.27.86.48:2222
83.213.192.136:443
83.202.26.241:2222
103.141.50.151:995
197.204.236.174:443
74.33.196.114:443
24.64.112.40:2078
12.172.173.82:20
84.219.213.130:6881
90.104.22.28:2222
27.0.48.233:443
119.82.122.226:443
59.28.84.65:443
136.232.184.134:995
70.66.199.12:443
125.99.69.178:443
162.248.14.107:443
75.98.154.19:443
87.243.146.59:443
88.126.94.4:50000
92.154.45.81:2222
197.148.17.17:2078
64.237.207.9:443
92.186.69.229:2222
73.165.119.20:443
76.64.202.88:2222
98.145.23.67:443
91.68.227.219:443
70.77.116.233:443
79.9.64.37:995
174.104.184.149:443
24.64.112.40:3389
81.151.102.224:443
47.34.30.133:443
86.250.12.217:2222
50.68.204.71:993
156.217.208.137:995
181.118.206.65:995
103.212.19.254:995
83.114.60.6:2222
90.23.19.86:2222
66.131.25.6:443
12.172.173.82:465
86.195.14.72:2222
184.153.132.82:443
91.170.115.68:32100
72.80.7.6:995
71.31.101.183:443
198.2.51.242:993
125.20.112.94:443
92.11.194.53:995
12.172.173.82:32101
31.120.202.209:443
173.18.126.3:443
76.80.180.154:995
24.71.120.191:443
27.0.48.205:443
81.229.117.95:2222
103.252.7.228:443
190.191.35.122:443
87.223.87.126:443
84.35.26.14:995
73.36.196.11:443
171.97.42.67:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3444 rundll32.exe 3444 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2476 3940 WerFault.exe 82 3920 5052 WerFault.exe 14 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3444 rundll32.exe 3444 rundll32.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe 1812 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3444 rundll32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3940 1772 rundll32.exe 82 PID 1772 wrote to memory of 3940 1772 rundll32.exe 82 PID 1772 wrote to memory of 3940 1772 rundll32.exe 82 PID 2864 wrote to memory of 2248 2864 cmd.exe 103 PID 2864 wrote to memory of 2248 2864 cmd.exe 103 PID 2248 wrote to memory of 3444 2248 rundll32.exe 104 PID 2248 wrote to memory of 3444 2248 rundll32.exe 104 PID 2248 wrote to memory of 3444 2248 rundll32.exe 104 PID 3444 wrote to memory of 4952 3444 rundll32.exe 105 PID 3444 wrote to memory of 4952 3444 rundll32.exe 105 PID 3444 wrote to memory of 4952 3444 rundll32.exe 105 PID 3444 wrote to memory of 1812 3444 rundll32.exe 106 PID 3444 wrote to memory of 1812 3444 rundll32.exe 106 PID 3444 wrote to memory of 1812 3444 rundll32.exe 106 PID 3444 wrote to memory of 1812 3444 rundll32.exe 106 PID 3444 wrote to memory of 1812 3444 rundll32.exe 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\r.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\r.dll,#12⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 6003⤵
- Program crash
PID:2476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3940 -ip 39401⤵PID:2280
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\rundll32.exerundll32.exe r.dll,Wind2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe r.dll,Wind3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵PID:4952
-
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 5052 -ip 50521⤵PID:3760
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5052 -s 7881⤵
- Program crash
PID:3920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f530495445432d6ae00f2b0f08f7c804
SHA1f66f538b95b1a924c8392fbe7743d193d78eb50c
SHA2565cc51f26704eef3b59e6d33ea690fa5c62237627269493ead5bad6f71d2de07b
SHA5122b44ed622e63014a0d2d613d8bbc1548dd193460ce7711414dc4eb62a2aef69d57c9821f834555539b6a49f584cb46c5e82a9867ab0a0733d78e4f1d032d6ce8
-
Filesize
2.1MB
MD5f530495445432d6ae00f2b0f08f7c804
SHA1f66f538b95b1a924c8392fbe7743d193d78eb50c
SHA2565cc51f26704eef3b59e6d33ea690fa5c62237627269493ead5bad6f71d2de07b
SHA5122b44ed622e63014a0d2d613d8bbc1548dd193460ce7711414dc4eb62a2aef69d57c9821f834555539b6a49f584cb46c5e82a9867ab0a0733d78e4f1d032d6ce8