Analysis
-
max time kernel
60s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2023 21:31
Static task
static1
Behavioral task
behavioral1
Sample
test/RunDLL-1.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
test/RunDLL-1.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
test/e93e14b1a7419bdc3158b88c4a91363891c2419f3581ba7f888e22ad6725b5c7.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
test/e93e14b1a7419bdc3158b88c4a91363891c2419f3581ba7f888e22ad6725b5c7.dll
Resource
win10v2004-20221111-en
General
-
Target
test/RunDLL-1.bat
-
Size
86B
-
MD5
7494c8340529f58d89ab1c4a6eb86e39
-
SHA1
1dd9fee6644ed163999ccd20f750d84d08aa360f
-
SHA256
587c6243af6bfb7a06ec5503fbe2cc6eb36cf3f31a80fe1df501294293f17e7a
-
SHA512
afc46cdb9a2c83083e12c924f998fcc77bbb053bcb629e4eaf7ea185950005bcf3e4f2a9ee45d1adb2c1ef0236c8427f8a9f64f926309d12d4dcd30af2790d7c
Malware Config
Extracted
qakbot
404.506
azd
1676370608
85.59.61.52:2222
216.228.41.244:2222
174.58.146.57:443
103.42.86.110:995
147.219.4.194:443
89.32.157.195:995
76.80.180.154:995
79.67.165.149:995
71.31.101.183:443
198.2.51.242:993
88.111.182.118:2222
72.203.216.98:2222
72.80.7.6:995
12.172.173.82:32101
50.68.204.71:995
209.142.97.83:995
82.121.195.187:2222
81.229.117.95:2222
171.96.205.252:443
37.14.229.220:2222
69.133.162.35:443
86.196.12.21:2222
2.99.47.198:2222
70.77.116.233:443
76.170.252.153:995
73.29.92.128:443
103.231.216.238:443
202.142.98.62:443
50.68.186.195:443
12.172.173.82:50001
183.87.163.165:443
35.143.97.145:995
84.215.202.22:443
50.68.204.71:443
85.61.165.153:2222
12.172.173.82:995
73.161.176.218:443
213.67.255.57:2222
81.157.227.223:2222
95.94.41.77:2222
75.143.236.149:443
213.31.90.183:2222
85.241.180.94:443
98.145.23.67:443
122.184.143.82:443
71.52.53.166:443
162.248.14.107:443
190.206.75.58:2222
86.169.203.116:443
82.127.204.82:2222
47.21.51.138:995
75.98.154.19:443
45.246.235.113:995
91.68.227.219:443
86.207.227.152:2222
78.218.230.28:443
87.221.197.113:2222
91.165.188.74:50000
174.104.184.149:443
86.138.7.220:2222
67.187.130.101:443
12.172.173.82:2087
58.247.115.126:995
73.165.119.20:443
90.104.22.28:2222
74.33.196.114:443
121.121.100.207:995
12.172.173.82:20
116.72.250.18:443
172.248.42.122:443
85.85.34.201:993
2.13.73.146:2222
31.53.29.145:2222
103.123.223.76:443
71.112.212.166:443
92.27.86.48:2222
46.24.103.218:2078
93.24.192.142:20
176.142.207.63:443
217.128.91.196:2222
12.172.173.82:465
89.129.109.27:2222
50.68.204.71:993
12.172.173.82:21
12.172.173.82:990
47.34.30.133:443
197.26.145.223:443
24.71.120.191:443
87.223.82.41:443
72.200.109.104:443
94.59.56.206:2222
84.35.26.14:995
24.239.69.244:443
68.108.122.180:443
70.64.77.115:443
161.142.107.68:995
173.18.126.3:443
45.50.233.214:443
103.212.19.254:995
217.165.186.116:2222
136.232.184.134:995
2.50.48.213:443
93.147.235.8:443
217.128.200.114:2222
92.186.69.229:2222
91.170.115.68:32100
86.130.9.232:2222
64.237.185.60:443
86.202.48.142:2222
104.35.24.154:443
59.28.84.65:443
86.225.214.138:2222
107.146.12.26:2222
74.92.243.113:50000
73.36.196.11:443
88.126.112.14:50000
87.202.101.164:50000
27.0.48.205:443
103.144.201.53:2078
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2412 1580 WerFault.exe wermgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exemsra.exepid process 4932 rundll32.exe 4932 rundll32.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe 176 msra.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exepid process 4932 rundll32.exe 4932 rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 4872 wrote to memory of 4844 4872 cmd.exe rundll32.exe PID 4872 wrote to memory of 4844 4872 cmd.exe rundll32.exe PID 4844 wrote to memory of 4932 4844 rundll32.exe rundll32.exe PID 4844 wrote to memory of 4932 4844 rundll32.exe rundll32.exe PID 4844 wrote to memory of 4932 4844 rundll32.exe rundll32.exe PID 4932 wrote to memory of 1472 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 1472 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 1472 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 1580 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 1580 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 1580 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 1580 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 1580 4932 rundll32.exe wermgr.exe PID 4932 wrote to memory of 176 4932 rundll32.exe msra.exe PID 4932 wrote to memory of 176 4932 rundll32.exe msra.exe PID 4932 wrote to memory of 176 4932 rundll32.exe msra.exe PID 4932 wrote to memory of 176 4932 rundll32.exe msra.exe PID 4932 wrote to memory of 176 4932 rundll32.exe msra.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\test\RunDLL-1.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe e93e14b1a7419bdc3158b88c4a91363891c2419f3581ba7f888e22ad6725b5c7.dll,Wind2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe e93e14b1a7419bdc3158b88c4a91363891c2419f3581ba7f888e22ad6725b5c7.dll,Wind3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 3525⤵
- Program crash
-
C:\Windows\SysWOW64\msra.exeC:\Windows\SysWOW64\msra.exe4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1580 -ip 15801⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/176-141-0x0000000000000000-mapping.dmp
-
memory/176-142-0x00000000003B0000-0x00000000003D3000-memory.dmpFilesize
140KB
-
memory/176-143-0x00000000003B0000-0x00000000003D3000-memory.dmpFilesize
140KB
-
memory/1580-140-0x0000000000000000-mapping.dmp
-
memory/4844-132-0x0000000000000000-mapping.dmp
-
memory/4932-133-0x0000000000000000-mapping.dmp
-
memory/4932-134-0x0000000010000000-0x0000000010023000-memory.dmpFilesize
140KB
-
memory/4932-139-0x0000000001370000-0x0000000001373000-memory.dmpFilesize
12KB