Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-de -
resource tags
arch:x64arch:x86image:win10v2004-20230220-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
15-03-2023 19:28
Static task
static1
Behavioral task
behavioral1
Sample
a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll
Resource
win7-20230220-de
General
-
Target
a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll
-
Size
260KB
-
MD5
3b8ca07dfa8d8ed5d7a4522ddcc65e88
-
SHA1
acc5b1ba536db0f88b8144450ef1f1dbb1338b55
-
SHA256
a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b
-
SHA512
e1535e0f95f7635fce77e4a00bed1eb0300934257b5ecc4dbcece970e98cbbf1fcafc9c40ce9a966b17c584b9623c8cd18e681fa43497d1cc4ab1c592a87cd5a
-
SSDEEP
6144:rwxqaEeZ4POyKmLrLqGvHr0nNK11G9DFj:sHEnxZrkNK11G95
Malware Config
Extracted
qakbot
401.51
abc105
1606839097
90.101.117.122:2222
78.97.207.104:443
189.222.242.165:995
95.76.27.6:443
2.50.56.81:443
96.225.88.23:443
47.21.192.182:2222
189.222.242.165:443
197.86.204.38:443
84.117.176.32:443
93.146.133.102:2222
71.38.13.243:443
96.21.251.127:2222
184.98.97.227:995
58.179.21.147:995
187.213.136.249:995
65.30.213.13:6882
80.195.103.146:2222
106.51.85.162:443
187.227.87.235:995
94.59.236.155:995
94.53.16.196:443
89.137.211.239:443
190.162.118.43:0
45.32.162.253:443
45.32.165.134:443
140.82.27.132:443
173.245.152.231:443
92.137.138.52:2222
92.154.83.96:1194
190.220.8.10:993
151.75.13.83:443
77.132.113.187:2222
186.147.222.63:443
2.51.246.190:995
69.47.239.10:443
68.116.193.239:443
96.27.47.70:2222
68.134.181.98:443
197.45.110.165:995
86.99.134.235:2222
71.83.16.211:443
78.96.199.79:443
189.210.115.207:443
24.179.13.119:443
74.102.76.128:443
84.126.11.130:443
176.181.247.197:443
173.169.189.169:443
187.149.126.53:443
68.131.19.52:443
189.140.45.48:995
86.98.34.84:995
208.82.44.203:443
200.30.223.162:443
184.21.136.237:995
65.131.47.74:995
71.197.126.250:443
72.252.201.69:443
82.12.157.95:995
187.153.119.36:443
24.71.28.247:443
72.36.11.22:443
181.208.249.141:443
200.110.188.218:443
118.70.55.146:443
39.32.55.12:995
62.38.114.12:2222
104.37.20.207:995
172.87.157.235:443
185.163.221.77:2222
197.161.154.132:443
83.110.150.100:443
151.60.163.18:443
73.51.245.231:995
67.8.103.21:443
37.210.131.246:443
151.27.89.199:443
79.129.216.215:2222
75.136.26.147:443
94.69.112.148:2222
41.97.183.51:443
5.13.70.10:443
85.132.36.111:2222
67.237.68.126:2222
96.247.176.125:443
80.11.5.65:2222
184.179.14.130:22
156.205.103.107:995
67.61.157.208:443
93.113.177.152:443
24.209.209.72:443
197.206.132.79:443
72.240.200.181:2222
96.41.93.96:443
85.122.141.42:995
108.46.145.30:443
2.232.253.79:995
79.172.26.240:443
5.193.115.251:2222
71.182.142.63:443
72.28.255.159:995
85.204.189.105:443
196.151.252.84:443
98.240.24.57:443
67.82.244.199:2222
189.141.31.12:443
193.248.154.174:2222
120.151.95.167:443
178.222.114.132:995
172.87.134.226:443
151.45.108.75:443
173.47.125.178:995
24.139.72.117:443
45.118.216.157:443
74.75.237.11:443
24.187.56.74:2222
75.109.180.221:443
197.135.177.36:443
190.103.55.108:443
81.214.126.173:2222
87.27.110.90:2222
185.246.9.69:995
217.133.54.140:32100
78.97.3.6:443
189.150.40.192:2222
87.218.53.206:2222
181.169.88.203:443
94.49.188.240:443
46.124.107.124:6881
83.202.68.220:2222
47.187.49.3:2222
83.196.50.197:2222
2.90.33.130:443
109.209.94.165:2222
79.119.124.237:443
2.88.53.159:995
86.120.64.243:443
116.240.78.45:995
94.53.92.42:443
181.129.155.10:443
67.6.54.180:443
96.40.175.33:443
149.28.98.196:995
109.205.204.229:2222
45.63.107.192:2222
74.129.26.119:443
173.88.7.176:443
206.183.190.53:993
94.141.3.242:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4852 regsvr32.exe -
Drops file in Windows directory 8 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\INF\audioendpoint.PNF rundll32.exe File opened for modification C:\Windows\INF\netrtl64.PNF rundll32.exe File opened for modification C:\Windows\INF\printqueue.PNF rundll32.exe File opened for modification C:\Windows\INF\kdnic.PNF rundll32.exe File opened for modification C:\Windows\INF\c_swdevice.PNF rundll32.exe File opened for modification C:\Windows\INF\disk.PNF rundll32.exe File opened for modification C:\Windows\INF\vhdmp.PNF rundll32.exe File opened for modification C:\Windows\INF\cpu.PNF rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3236 4852 WerFault.exe regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 4272 rundll32.exe 4272 rundll32.exe 4272 rundll32.exe 4272 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 4272 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exedescription pid process target process PID 3068 wrote to memory of 4272 3068 rundll32.exe rundll32.exe PID 3068 wrote to memory of 4272 3068 rundll32.exe rundll32.exe PID 3068 wrote to memory of 4272 3068 rundll32.exe rundll32.exe PID 4272 wrote to memory of 2144 4272 rundll32.exe explorer.exe PID 4272 wrote to memory of 2144 4272 rundll32.exe explorer.exe PID 4272 wrote to memory of 2144 4272 rundll32.exe explorer.exe PID 4272 wrote to memory of 2144 4272 rundll32.exe explorer.exe PID 4272 wrote to memory of 2144 4272 rundll32.exe explorer.exe PID 2144 wrote to memory of 5096 2144 explorer.exe schtasks.exe PID 2144 wrote to memory of 5096 2144 explorer.exe schtasks.exe PID 2144 wrote to memory of 5096 2144 explorer.exe schtasks.exe PID 4540 wrote to memory of 4852 4540 regsvr32.exe regsvr32.exe PID 4540 wrote to memory of 4852 4540 regsvr32.exe regsvr32.exe PID 4540 wrote to memory of 4852 4540 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll,#12⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn biwbgks /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll\"" /SC ONCE /Z /ST 20:31 /ET 20:434⤵
- Creates scheduled task(s)
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll"2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 5843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4852 -ip 48521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dllFilesize
260KB
MD5530b4966931ad18914fdf87fc8a8f713
SHA10becbe86863faa673acea89e29ae3fbe0bdefbcc
SHA2568f1e37410b025c56bd0da4fade88f0c5d89368b6ba8c3b5c4fe09cd10935066e
SHA51272828206761e7dd75d5da385ef514cc9550e8f2f15f040270458fba922cc6123a685d69ca08587c6f893c7dfac14b832cccc2b2c443f8ef916bff1d1ef63a70e
-
C:\Users\Admin\AppData\Local\Temp\a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dllFilesize
260KB
MD5530b4966931ad18914fdf87fc8a8f713
SHA10becbe86863faa673acea89e29ae3fbe0bdefbcc
SHA2568f1e37410b025c56bd0da4fade88f0c5d89368b6ba8c3b5c4fe09cd10935066e
SHA51272828206761e7dd75d5da385ef514cc9550e8f2f15f040270458fba922cc6123a685d69ca08587c6f893c7dfac14b832cccc2b2c443f8ef916bff1d1ef63a70e
-
C:\Windows\INF\audioendpoint.PNFFilesize
5KB
MD5c846d81a5ff9c57611bd9bfda9f7e8b1
SHA18f75b0469b194194a7d6ebec207b8076de48d588
SHA256c2cf15745458220b9af6942fd5114a1590af440be9551b80c5a19d110ff28a6a
SHA512f6a35c386e79d80ad6f2f38f2dca0acd5296ed3454c2c5cdc1f1c5232868239c77bce349201c067bc5110ad45252bd0996d36dafabb66879b1867b56afe0743b
-
C:\Windows\INF\c_swdevice.PNFFilesize
6KB
MD5af582dd243956f076f0fbb0ce2ca3710
SHA13317a5133774b27a2b3da9831a615d9c32a1d6a7
SHA256ed6d900fe81f39a09c099ea4890a6cdb9413f2de321f2b9e5a04aa65bf8b7049
SHA51298bdd1f567e20b6b298f55c8e4ee4105752f8a31728ddffafaac2519cd238b62a831bf09702bf9dfa3d135ca3364f7a1f911e14076ba3e3a03bf93ef0743864c
-
C:\Windows\INF\cpu.PNFFilesize
19KB
MD51108b3bc5b499c0120f9bf3a33e1d635
SHA1ba4aca2bfd22c866607b2badf4c3d3f4504e846d
SHA2564aea8b5250c80ac0d9bffc29299466abb388843b5393231cf6cf2d3955247dff
SHA512d36813f97f8eef38163f521deb739dfccf88ead27f96ec98052a0c3555b10762872ea87680adb4e37c5e5a14cb87ea31b9d9c9cd6c7a9869719f14b81827c75d
-
C:\Windows\INF\printqueue.PNFFilesize
7KB
MD56e3b1b8c33104124154ee771d8460aad
SHA1a25551bc3b4eb2f81340fae42fa711cf758af2eb
SHA256f51c4bd59b47c091aa6c05ce5cba399f7fa15ecec223f3d16cc373dfaa81e8e3
SHA512ea48fd8e3babd54d9ad1415502c771ce084cbaf3c7e8d0f0e102fe53026659bf14090cdf0063a93c1780d628d3b7f246b18606d064b37f7242fd4fd66061431e
-
memory/2144-196-0x0000000000710000-0x0000000000731000-memory.dmpFilesize
132KB
-
memory/2144-197-0x0000000000710000-0x0000000000731000-memory.dmpFilesize
132KB
-
memory/2144-198-0x0000000000710000-0x0000000000731000-memory.dmpFilesize
132KB
-
memory/2144-200-0x0000000000710000-0x0000000000731000-memory.dmpFilesize
132KB
-
memory/2144-201-0x0000000000710000-0x0000000000731000-memory.dmpFilesize
132KB
-
memory/4272-133-0x0000000010000000-0x0000000010041000-memory.dmpFilesize
260KB
-
memory/4272-134-0x00000000008F0000-0x0000000000931000-memory.dmpFilesize
260KB