Analysis
-
max time kernel
108s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 17:34
Static task
static1
Behavioral task
behavioral1
Sample
Ungripping.dll
Resource
win7-20230220-en
General
-
Target
Ungripping.dll
-
Size
881KB
-
MD5
328c7bd717baffb021419154dca563d8
-
SHA1
2ce3de50a614ef7937dcce8a2c13d5de5e68b48c
-
SHA256
293c6bb43cc267a6f0dd9f2da1d62144ddb63159a8f93a2ea2c963e0e44d87f4
-
SHA512
6f66c3dca37d2909b9144136311777027a5417a49ff901753733b558066ee7058687730ecb449ad37ef103422535843b3a69236fe74c71eab158ad0004e6a7ce
-
SSDEEP
24576:V9sT4ppNP7Empue12E35Tdkq0aljWrHnl5oPhepzGIrx1lA0iO1PTIsrq:YQbD0nEZAl/iOKsr
Malware Config
Extracted
qakbot
404.450
BB20
1679248733
75.143.236.149:443
80.42.186.99:2222
50.68.204.71:993
47.32.78.150:443
50.68.204.71:443
90.165.109.4:2222
178.152.121.81:443
78.69.251.252:2222
86.45.66.141:2222
91.68.227.219:443
80.1.152.201:443
213.91.235.146:443
198.2.51.242:993
92.154.17.149:2222
174.4.89.3:443
86.191.9.6:995
2.14.137.60:2222
93.147.134.85:443
92.149.250.113:2222
73.165.119.20:443
69.133.162.35:443
12.172.173.82:20
74.92.243.113:50000
162.248.14.107:443
24.69.84.237:443
174.104.184.149:443
82.127.172.214:2222
213.31.90.183:2222
72.203.216.98:2222
122.184.143.86:443
71.171.83.69:443
91.2.135.211:995
201.244.108.183:995
70.53.96.223:995
102.158.52.4:443
37.14.229.220:2222
24.178.201.230:2222
92.27.86.48:2222
86.225.214.138:2222
74.66.134.24:443
78.218.230.28:443
190.11.198.76:443
12.172.173.82:50001
31.48.18.52:443
95.242.101.251:995
12.172.173.82:993
80.76.163.207:2222
12.172.173.82:22
184.176.110.61:61202
184.176.35.223:2222
92.239.81.124:443
12.172.173.82:2087
98.145.23.67:443
174.119.104.47:443
83.213.192.136:443
109.49.47.10:80
62.35.100.38:443
213.67.255.57:2222
72.80.94.230:443
81.229.117.95:2222
99.253.131.148:443
190.199.184.114:2222
109.11.175.42:2222
73.36.196.11:443
92.159.173.52:2222
70.53.31.142:2222
72.200.109.104:443
90.104.22.28:2222
86.130.9.213:2222
71.231.150.81:443
73.88.173.113:443
85.245.51.95:443
85.61.165.153:2222
86.195.14.72:2222
50.68.204.71:995
12.172.173.82:995
24.117.237.157:443
70.160.80.210:443
79.92.15.6:443
209.171.163.72:995
86.176.144.240:2222
182.178.178.105:995
190.191.35.122:443
76.71.137.91:2222
78.16.156.25:443
50.86.217.209:443
91.254.229.61:443
78.130.215.67:443
76.80.180.154:995
67.253.226.137:995
47.34.30.133:443
76.170.252.153:995
98.37.25.99:443
88.171.156.150:50000
184.153.132.82:443
47.196.225.236:443
81.158.112.20:2222
74.58.71.237:443
200.109.6.16:2222
65.25.116.200:443
35.143.97.145:995
109.146.46.4:50000
49.245.95.124:2222
119.82.120.175:443
69.119.123.159:2222
64.237.245.195:443
82.155.108.153:443
12.172.173.82:465
188.79.242.89:2222
12.172.173.82:32101
77.86.98.236:443
92.186.69.229:2222
50.68.186.195:443
71.65.145.108:443
84.216.198.124:6881
88.126.94.4:50000
86.188.92.7:443
197.207.61.243:2078
216.210.65.47:443
84.108.200.161:443
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewermgr.exepid process 2120 rundll32.exe 2120 rundll32.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe 4528 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 2120 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4380 wrote to memory of 2120 4380 rundll32.exe rundll32.exe PID 4380 wrote to memory of 2120 4380 rundll32.exe rundll32.exe PID 4380 wrote to memory of 2120 4380 rundll32.exe rundll32.exe PID 2120 wrote to memory of 4528 2120 rundll32.exe wermgr.exe PID 2120 wrote to memory of 4528 2120 rundll32.exe wermgr.exe PID 2120 wrote to memory of 4528 2120 rundll32.exe wermgr.exe PID 2120 wrote to memory of 4528 2120 rundll32.exe wermgr.exe PID 2120 wrote to memory of 4528 2120 rundll32.exe wermgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Ungripping.dll,WW501⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Ungripping.dll,WW502⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2120-143-0x0000000000FA0000-0x0000000000FA3000-memory.dmpFilesize
12KB
-
memory/2120-139-0x0000000010000000-0x0000000010032000-memory.dmpFilesize
200KB
-
memory/2120-138-0x0000000000FA0000-0x0000000000FA3000-memory.dmpFilesize
12KB
-
memory/2120-140-0x0000000010000000-0x0000000010032000-memory.dmpFilesize
200KB
-
memory/2120-142-0x0000000070A00000-0x0000000070ADD000-memory.dmpFilesize
884KB
-
memory/2120-133-0x0000000010000000-0x0000000010032000-memory.dmpFilesize
200KB
-
memory/4528-141-0x00000000012D0000-0x0000000001302000-memory.dmpFilesize
200KB
-
memory/4528-144-0x00000000012D0000-0x0000000001302000-memory.dmpFilesize
200KB
-
memory/4528-145-0x00000000012D0000-0x0000000001302000-memory.dmpFilesize
200KB
-
memory/4528-146-0x00000000012D0000-0x0000000001302000-memory.dmpFilesize
200KB
-
memory/4528-147-0x00000000012D0000-0x0000000001302000-memory.dmpFilesize
200KB
-
memory/4528-149-0x00000000012D0000-0x0000000001302000-memory.dmpFilesize
200KB
-
memory/4528-150-0x00000000012D0000-0x0000000001302000-memory.dmpFilesize
200KB