Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14-02-2023 14:22
Static task
static1
Behavioral task
behavioral1
Sample
n4B82OsK.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
n4B82OsK.dll
Resource
win10v2004-20221111-en
General
-
Target
n4B82OsK.dll
-
Size
434KB
-
MD5
2349a28eb53ad73503e3396e1c8c723c
-
SHA1
aed38e62e119b6fdc7aecb5ddb726f35ccd07468
-
SHA256
b122fcf8be633245b36f8cc864bc115b0f9aaa06486e16dd620333c88cfbf1b3
-
SHA512
670b9a15f907413b92d11193b74f829d2d6782e239d9ef2e1aadf8ccbc290fdeace9ae57e7d2997d44d6a309a093419c2dd1bfc071bc3c74f2316dbadb83422c
-
SSDEEP
12288:rJZ701RXT1BaB4Irm8VGf9hyI8K9HGgnA:VZ701RXT1wB4Irz0f9hND
Malware Config
Extracted
qakbot
404.506
azd
1676370608
85.59.61.52:2222
216.228.41.244:2222
174.58.146.57:443
103.42.86.110:995
147.219.4.194:443
89.32.157.195:995
76.80.180.154:995
79.67.165.149:995
71.31.101.183:443
198.2.51.242:993
88.111.182.118:2222
72.203.216.98:2222
72.80.7.6:995
12.172.173.82:32101
50.68.204.71:995
209.142.97.83:995
82.121.195.187:2222
81.229.117.95:2222
171.96.205.252:443
37.14.229.220:2222
69.133.162.35:443
86.196.12.21:2222
2.99.47.198:2222
70.77.116.233:443
76.170.252.153:995
73.29.92.128:443
103.231.216.238:443
202.142.98.62:443
50.68.186.195:443
12.172.173.82:50001
183.87.163.165:443
35.143.97.145:995
84.215.202.22:443
50.68.204.71:443
85.61.165.153:2222
12.172.173.82:995
73.161.176.218:443
213.67.255.57:2222
81.157.227.223:2222
95.94.41.77:2222
75.143.236.149:443
213.31.90.183:2222
85.241.180.94:443
98.145.23.67:443
122.184.143.82:443
71.52.53.166:443
162.248.14.107:443
190.206.75.58:2222
86.169.203.116:443
82.127.204.82:2222
47.21.51.138:995
75.98.154.19:443
45.246.235.113:995
91.68.227.219:443
86.207.227.152:2222
78.218.230.28:443
87.221.197.113:2222
91.165.188.74:50000
174.104.184.149:443
86.138.7.220:2222
67.187.130.101:443
12.172.173.82:2087
58.247.115.126:995
73.165.119.20:443
90.104.22.28:2222
74.33.196.114:443
121.121.100.207:995
12.172.173.82:20
116.72.250.18:443
172.248.42.122:443
85.85.34.201:993
2.13.73.146:2222
31.53.29.145:2222
103.123.223.76:443
71.112.212.166:443
92.27.86.48:2222
46.24.103.218:2078
93.24.192.142:20
176.142.207.63:443
217.128.91.196:2222
12.172.173.82:465
89.129.109.27:2222
50.68.204.71:993
12.172.173.82:21
12.172.173.82:990
47.34.30.133:443
197.26.145.223:443
24.71.120.191:443
87.223.82.41:443
72.200.109.104:443
94.59.56.206:2222
84.35.26.14:995
24.239.69.244:443
68.108.122.180:443
70.64.77.115:443
161.142.107.68:995
173.18.126.3:443
45.50.233.214:443
103.212.19.254:995
217.165.186.116:2222
136.232.184.134:995
2.50.48.213:443
93.147.235.8:443
217.128.200.114:2222
92.186.69.229:2222
91.170.115.68:32100
86.130.9.232:2222
64.237.185.60:443
86.202.48.142:2222
104.35.24.154:443
59.28.84.65:443
86.225.214.138:2222
107.146.12.26:2222
74.92.243.113:50000
73.36.196.11:443
88.126.112.14:50000
87.202.101.164:50000
27.0.48.205:443
103.144.201.53:2078
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1988 1416 WerFault.exe rundll32.exe 956 1824 WerFault.exe wermgr.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exenetstat.exepid process 1720 ipconfig.exe 1644 netstat.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exemsra.exepid process 1704 rundll32.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe 1640 msra.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exepid process 1704 rundll32.exe 1704 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
netstat.exewhoami.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1644 netstat.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeDebugPrivilege 1704 whoami.exe Token: SeRestorePrivilege 1992 msiexec.exe Token: SeTakeOwnershipPrivilege 1992 msiexec.exe Token: SeSecurityPrivilege 1992 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.execmd.exerundll32.exerundll32.exewermgr.exemsra.exedescription pid process target process PID 2032 wrote to memory of 1416 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1416 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1416 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1416 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1416 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1416 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1416 2032 rundll32.exe rundll32.exe PID 1416 wrote to memory of 1988 1416 rundll32.exe WerFault.exe PID 1416 wrote to memory of 1988 1416 rundll32.exe WerFault.exe PID 1416 wrote to memory of 1988 1416 rundll32.exe WerFault.exe PID 1416 wrote to memory of 1988 1416 rundll32.exe WerFault.exe PID 1120 wrote to memory of 904 1120 cmd.exe rundll32.exe PID 1120 wrote to memory of 904 1120 cmd.exe rundll32.exe PID 1120 wrote to memory of 904 1120 cmd.exe rundll32.exe PID 904 wrote to memory of 1704 904 rundll32.exe rundll32.exe PID 904 wrote to memory of 1704 904 rundll32.exe rundll32.exe PID 904 wrote to memory of 1704 904 rundll32.exe rundll32.exe PID 904 wrote to memory of 1704 904 rundll32.exe rundll32.exe PID 904 wrote to memory of 1704 904 rundll32.exe rundll32.exe PID 904 wrote to memory of 1704 904 rundll32.exe rundll32.exe PID 904 wrote to memory of 1704 904 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1052 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1052 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1052 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1052 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1824 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1824 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1824 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1824 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1824 1704 rundll32.exe wermgr.exe PID 1704 wrote to memory of 1824 1704 rundll32.exe wermgr.exe PID 1824 wrote to memory of 956 1824 wermgr.exe WerFault.exe PID 1824 wrote to memory of 956 1824 wermgr.exe WerFault.exe PID 1824 wrote to memory of 956 1824 wermgr.exe WerFault.exe PID 1824 wrote to memory of 956 1824 wermgr.exe WerFault.exe PID 1704 wrote to memory of 1640 1704 rundll32.exe msra.exe PID 1704 wrote to memory of 1640 1704 rundll32.exe msra.exe PID 1704 wrote to memory of 1640 1704 rundll32.exe msra.exe PID 1704 wrote to memory of 1640 1704 rundll32.exe msra.exe PID 1704 wrote to memory of 1640 1704 rundll32.exe msra.exe PID 1704 wrote to memory of 1640 1704 rundll32.exe msra.exe PID 1640 wrote to memory of 1540 1640 msra.exe net.exe PID 1640 wrote to memory of 1540 1640 msra.exe net.exe PID 1640 wrote to memory of 1540 1640 msra.exe net.exe PID 1640 wrote to memory of 1540 1640 msra.exe net.exe PID 1640 wrote to memory of 1924 1640 msra.exe cmd.exe PID 1640 wrote to memory of 1924 1640 msra.exe cmd.exe PID 1640 wrote to memory of 1924 1640 msra.exe cmd.exe PID 1640 wrote to memory of 1924 1640 msra.exe cmd.exe PID 1640 wrote to memory of 1836 1640 msra.exe arp.exe PID 1640 wrote to memory of 1836 1640 msra.exe arp.exe PID 1640 wrote to memory of 1836 1640 msra.exe arp.exe PID 1640 wrote to memory of 1836 1640 msra.exe arp.exe PID 1640 wrote to memory of 1720 1640 msra.exe ipconfig.exe PID 1640 wrote to memory of 1720 1640 msra.exe ipconfig.exe PID 1640 wrote to memory of 1720 1640 msra.exe ipconfig.exe PID 1640 wrote to memory of 1720 1640 msra.exe ipconfig.exe PID 1640 wrote to memory of 1648 1640 msra.exe nslookup.exe PID 1640 wrote to memory of 1648 1640 msra.exe nslookup.exe PID 1640 wrote to memory of 1648 1640 msra.exe nslookup.exe PID 1640 wrote to memory of 1648 1640 msra.exe nslookup.exe PID 1640 wrote to memory of 1416 1640 msra.exe net.exe PID 1640 wrote to memory of 1416 1640 msra.exe net.exe PID 1640 wrote to memory of 1416 1640 msra.exe net.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\n4B82OsK.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\n4B82OsK.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 2243⤵
- Program crash
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\Windows\System32\rundll32.exerundll32.exe c:\Users\Admin\AppData\Local\Temp\n4B82OsK.dll,Wind2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\Users\Admin\AppData\Local\Temp\n4B82OsK.dll,Wind3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 1565⤵
- Program crash
-
C:\Windows\SysWOW64\msra.exeC:\Windows\SysWOW64\msra.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet view5⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\cmd.execmd /c set5⤵
-
C:\Windows\SysWOW64\arp.exearp -a5⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- Gathers network information
-
C:\Windows\SysWOW64\nslookup.exenslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.WORKGROUP5⤵
-
C:\Windows\SysWOW64\net.exenet share5⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share6⤵
-
C:\Windows\SysWOW64\route.exeroute print5⤵
-
C:\Windows\SysWOW64\netstat.exenetstat -nao5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exenet localgroup5⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup6⤵
-
C:\Windows\SysWOW64\whoami.exewhoami /all5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/904-57-0x0000000000000000-mapping.dmp
-
memory/948-81-0x0000000000000000-mapping.dmp
-
memory/956-69-0x0000000000000000-mapping.dmp
-
memory/1416-55-0x00000000767B1000-0x00000000767B3000-memory.dmpFilesize
8KB
-
memory/1416-80-0x0000000000000000-mapping.dmp
-
memory/1416-54-0x0000000000000000-mapping.dmp
-
memory/1540-74-0x0000000000000000-mapping.dmp
-
memory/1640-73-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1640-70-0x0000000000000000-mapping.dmp
-
memory/1640-72-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1644-83-0x0000000000000000-mapping.dmp
-
memory/1648-79-0x0000000000000000-mapping.dmp
-
memory/1680-85-0x0000000000000000-mapping.dmp
-
memory/1704-58-0x0000000000000000-mapping.dmp
-
memory/1704-87-0x0000000000000000-mapping.dmp
-
memory/1704-65-0x00000000001A0000-0x00000000001A3000-memory.dmpFilesize
12KB
-
memory/1704-66-0x00000000001A0000-0x00000000001A3000-memory.dmpFilesize
12KB
-
memory/1704-60-0x0000000010000000-0x0000000010023000-memory.dmpFilesize
140KB
-
memory/1720-77-0x0000000000000000-mapping.dmp
-
memory/1760-82-0x0000000000000000-mapping.dmp
-
memory/1824-67-0x0000000000000000-mapping.dmp
-
memory/1832-84-0x0000000000000000-mapping.dmp
-
memory/1836-76-0x0000000000000000-mapping.dmp
-
memory/1924-75-0x0000000000000000-mapping.dmp
-
memory/1988-56-0x0000000000000000-mapping.dmp
-
memory/1992-88-0x000007FEFC451000-0x000007FEFC453000-memory.dmpFilesize
8KB