Analysis
-
max time kernel
299s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-03-2023 19:08
Static task
static1
Behavioral task
behavioral1
Sample
RunDLL-1.bat
Resource
win10-20230220-en
General
-
Target
RunDLL-1.bat
-
Size
29B
-
MD5
9a78cdda7bc823ff0a665e764f87a7a9
-
SHA1
659e88ee018794d0dfd32becc7adc8a6199f6d9f
-
SHA256
fd575e009f5b841a6971dbc651da1accd2227f46ffc2c5c41e604aa7e7cdd5d9
-
SHA512
c39bf673899c03252cda5e5e3eb4a2777ffca9a865123c8408026e32c2f7ca0763aa3cc432778fe2019d65142d17d8f1396eac03c2e03ef1728b3c4ff5d28e98
Malware Config
Extracted
qakbot
404.266
obama242
1678805546
92.239.81.124:443
176.202.46.81:443
2.49.58.47:2222
86.225.214.138:2222
74.66.134.24:443
213.31.90.183:2222
12.172.173.82:50001
202.187.87.178:995
70.53.96.223:995
92.154.45.81:2222
186.64.67.54:443
81.158.112.20:2222
190.191.35.122:443
68.173.170.110:8443
12.172.173.82:993
98.145.23.67:443
12.172.173.82:22
37.186.55.60:2222
84.216.198.124:6881
73.161.176.218:443
94.30.98.134:32100
78.196.246.32:443
12.172.173.82:995
88.122.133.88:32100
173.18.126.3:443
201.244.108.183:995
24.178.201.230:2222
76.27.40.189:443
151.65.134.135:443
197.14.148.149:443
197.244.108.123:443
201.137.185.109:443
86.130.9.213:2222
190.75.139.66:2222
213.67.255.57:2222
90.104.22.28:2222
189.222.53.217:443
122.184.143.84:443
92.159.173.52:2222
70.121.198.103:2078
91.68.227.219:443
86.236.114.212:2222
80.12.88.148:2222
178.175.187.254:443
73.36.196.11:443
47.196.225.236:443
65.95.49.237:2222
12.172.173.82:2087
184.176.35.223:2222
186.48.181.17:995
2.14.105.160:2222
208.180.17.32:2222
190.218.125.145:443
109.11.175.42:2222
23.251.92.171:2222
196.70.212.80:443
75.156.125.215:995
184.189.41.80:443
31.48.18.52:443
103.12.133.134:2222
70.51.152.61:2222
47.203.229.168:443
104.35.24.154:443
190.28.116.106:443
92.154.17.149:2222
103.169.83.89:443
86.169.103.3:443
92.27.86.48:2222
92.1.170.110:995
183.87.163.165:443
85.241.180.94:443
76.170.252.153:995
92.20.204.198:2222
103.141.50.102:995
81.229.117.95:2222
50.68.204.71:995
47.34.30.133:443
173.178.151.233:443
47.16.77.194:2222
83.92.85.93:443
76.80.180.154:995
67.70.23.222:2222
24.117.237.157:443
35.143.97.145:995
87.202.101.164:50000
64.237.245.195:443
103.231.216.238:443
74.93.148.97:995
103.71.21.107:443
71.65.145.108:443
12.172.173.82:465
72.80.7.6:50003
184.153.132.82:443
86.178.33.20:2222
94.200.183.66:2222
70.55.187.152:2222
98.159.33.25:443
136.35.241.159:443
24.187.145.201:2222
72.88.245.71:443
65.94.87.200:2222
184.176.110.61:61202
49.245.82.178:2222
12.172.173.82:32101
46.10.198.134:443
84.35.26.14:995
103.252.7.231:443
187.199.103.21:32103
139.5.239.14:443
202.142.98.62:443
27.109.19.90:2078
86.190.223.11:2222
75.143.236.149:443
50.68.204.71:993
91.169.12.198:32100
88.126.94.4:50000
24.239.69.244:443
12.172.173.82:21
174.104.184.149:443
116.72.250.18:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewermgr.exepid process 1176 rundll32.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe 1004 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 1176 rundll32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid process target process PID 1988 wrote to memory of 1936 1988 cmd.exe rundll32.exe PID 1988 wrote to memory of 1936 1988 cmd.exe rundll32.exe PID 1988 wrote to memory of 1936 1988 cmd.exe rundll32.exe PID 1936 wrote to memory of 1176 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1176 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1176 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1176 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1176 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1176 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1176 1936 rundll32.exe rundll32.exe PID 1176 wrote to memory of 1004 1176 rundll32.exe wermgr.exe PID 1176 wrote to memory of 1004 1176 rundll32.exe wermgr.exe PID 1176 wrote to memory of 1004 1176 rundll32.exe wermgr.exe PID 1176 wrote to memory of 1004 1176 rundll32.exe wermgr.exe PID 1176 wrote to memory of 1004 1176 rundll32.exe wermgr.exe PID 1176 wrote to memory of 1004 1176 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RunDLL-1.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe 3.dat,xlAutoOpen2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe 3.dat,xlAutoOpen3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1004-66-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-64-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-72-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-71-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-62-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-59-0x00000000000B0000-0x00000000000B2000-memory.dmpFilesize
8KB
-
memory/1004-68-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-65-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-61-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1004-63-0x0000000000080000-0x00000000000A3000-memory.dmpFilesize
140KB
-
memory/1176-58-0x0000000000220000-0x0000000000243000-memory.dmpFilesize
140KB
-
memory/1176-60-0x0000000000220000-0x0000000000243000-memory.dmpFilesize
140KB
-
memory/1176-54-0x0000000000220000-0x0000000000243000-memory.dmpFilesize
140KB
-
memory/1176-56-0x0000000000220000-0x0000000000243000-memory.dmpFilesize
140KB
-
memory/1176-57-0x0000000000160000-0x0000000000191000-memory.dmpFilesize
196KB
-
memory/1176-55-0x0000000000220000-0x0000000000243000-memory.dmpFilesize
140KB