Analysis
-
max time kernel
599s -
max time network
600s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27/02/2023, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
RunDLL-1.bat
Resource
win10-20230220-en
General
-
Target
RunDLL-1.bat
-
Size
39B
-
MD5
332cb71aae0f38bccd2a2a4bd84fb4f0
-
SHA1
d313a15c4a70bf96c9e49b37b8835b6bbc55c83c
-
SHA256
78989e162c93af89eb352e4423ede1be2645f7b411081eb5a6e243c98bd95c45
-
SHA512
61ca64eea0ee2f0b58d866ebe60bc0fb8ba723d45217284cf3de461bdd51dec9023ee4ad7641040f064bdf2c8defbed5e9a9ece124a31b95eda30085c03cb50c
Malware Config
Extracted
qakbot
404.66
BB17
1677490643
12.172.173.82:20
66.191.69.18:995
186.64.87.213:443
108.190.203.42:995
50.68.204.71:443
136.232.184.134:995
103.42.86.110:995
174.118.36.28:443
75.143.236.149:443
72.203.216.98:2222
85.241.180.94:443
197.92.136.122:443
72.200.109.104:443
85.152.152.46:443
102.156.252.46:443
12.172.173.82:995
2.99.47.198:2222
172.248.42.122:443
70.77.116.233:443
162.248.14.107:443
105.156.112.30:443
103.140.174.19:2222
174.104.184.149:443
80.13.205.69:2222
12.172.173.82:990
47.34.30.133:443
84.35.26.14:995
73.161.176.218:443
188.49.116.2:995
12.172.173.82:21
24.239.69.244:443
45.50.233.214:443
12.172.173.82:465
73.22.121.210:443
73.165.119.20:443
86.178.18.239:443
100.10.72.114:443
87.221.197.113:2222
173.18.126.3:443
14.192.241.76:995
24.187.145.201:2222
90.104.22.28:2222
91.254.132.23:443
74.92.243.113:50000
92.154.45.81:2222
86.190.223.11:2222
136.244.25.165:443
116.75.188.138:443
92.239.81.124:443
86.191.237.255:50000
103.231.216.238:443
201.244.108.183:995
103.111.70.115:995
47.21.51.138:995
161.142.102.110:995
71.31.101.183:443
98.145.23.67:443
86.225.214.138:2222
86.97.52.177:2222
70.160.80.210:443
12.172.173.82:2087
90.211.192.113:443
76.170.252.153:995
72.80.7.6:995
116.72.250.18:443
35.143.97.145:995
47.21.51.138:443
72.80.7.6:50003
82.127.204.82:2222
103.141.50.102:995
109.149.147.104:2222
87.223.83.119:443
92.27.86.48:2222
92.154.17.149:2222
103.252.7.231:443
103.212.19.254:995
114.143.176.235:443
180.151.104.240:443
85.59.61.52:2222
122.184.143.82:443
2.50.47.74:443
174.58.146.57:443
86.207.227.152:2222
125.99.69.178:443
46.27.231.50:2078
27.109.19.90:2078
59.28.84.65:443
87.243.146.59:443
12.172.173.82:50001
75.156.125.215:995
103.111.70.115:443
89.129.109.27:2222
190.191.35.122:443
86.130.9.136:2222
79.67.165.149:995
151.65.177.218:443
108.2.111.66:995
69.133.162.35:443
12.172.173.82:32101
81.229.117.95:2222
212.69.141.168:995
75.98.154.19:443
50.68.204.71:993
124.122.56.144:443
80.47.61.240:2222
50.68.204.71:995
198.2.51.242:993
103.144.201.53:2078
202.142.98.62:995
147.219.4.194:443
77.124.6.149:443
49.245.82.178:2222
86.202.48.142:2222
76.80.180.154:995
73.36.196.11:443
39.40.207.24:995
105.186.191.199:995
58.186.75.42:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1440 rundll32.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe 2000 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1440 rundll32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1484 wrote to memory of 832 1484 cmd.exe 28 PID 1484 wrote to memory of 832 1484 cmd.exe 28 PID 1484 wrote to memory of 832 1484 cmd.exe 28 PID 832 wrote to memory of 1440 832 rundll32.exe 29 PID 832 wrote to memory of 1440 832 rundll32.exe 29 PID 832 wrote to memory of 1440 832 rundll32.exe 29 PID 832 wrote to memory of 1440 832 rundll32.exe 29 PID 832 wrote to memory of 1440 832 rundll32.exe 29 PID 832 wrote to memory of 1440 832 rundll32.exe 29 PID 832 wrote to memory of 1440 832 rundll32.exe 29 PID 1440 wrote to memory of 2000 1440 rundll32.exe 30 PID 1440 wrote to memory of 2000 1440 rundll32.exe 30 PID 1440 wrote to memory of 2000 1440 rundll32.exe 30 PID 1440 wrote to memory of 2000 1440 rundll32.exe 30 PID 1440 wrote to memory of 2000 1440 rundll32.exe 30 PID 1440 wrote to memory of 2000 1440 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RunDLL-1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\rundll32.exerundll32.exe prelatesRequalify.dll,N1152⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe prelatesRequalify.dll,N1153⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd