Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-04-2023 18:18
Static task
static1
Behavioral task
behavioral1
Sample
fe4d2ebc920e60116b039236f07e45a9203fce4eaf7e5182c0a8610f49c7397c.dll
Resource
win7-20230220-en
General
-
Target
fe4d2ebc920e60116b039236f07e45a9203fce4eaf7e5182c0a8610f49c7397c.dll
-
Size
462KB
-
MD5
fd4829b31ddba9d86b755d94c1bd9d18
-
SHA1
51888e485511fe7db278715c72da0bd64f70bc89
-
SHA256
fe4d2ebc920e60116b039236f07e45a9203fce4eaf7e5182c0a8610f49c7397c
-
SHA512
5b7d2cad80f6b6d57984fd9ecff170e023a06f316228aac961ff081965d9a9af19692e345f3cb093d75308d679c31892f735602db557ed97c514b1d39c69ae6d
-
SSDEEP
12288:eAsKWT98cqSemKRLh0P4Fr8qFu8wPchGF4A7J7tTFJMvEPRrUxHYjKqNZrk7UazG:eJMvArUx4jfNko9ga
Malware Config
Extracted
qakbot
404.919
obama252
1681377757
70.28.50.223:2083
64.121.161.102:443
95.60.243.84:995
70.28.50.223:1194
49.245.95.124:2222
184.153.132.82:443
67.219.197.94:443
174.4.89.3:443
70.28.50.223:3389
213.91.235.146:443
75.115.14.189:443
202.142.98.62:443
70.64.77.115:443
70.28.50.223:2087
103.123.223.141:443
50.68.204.71:993
81.229.117.95:2222
72.134.124.16:443
76.170.252.153:995
85.245.221.87:2078
92.239.81.124:443
71.31.232.65:995
99.228.131.116:2222
122.184.143.83:443
43.243.215.210:443
50.68.204.71:443
50.68.186.195:443
213.67.139.53:2222
90.78.147.141:2222
41.230.171.196:443
86.176.144.145:2222
75.143.236.149:443
198.2.51.242:993
69.133.162.35:443
24.236.90.196:2078
161.142.103.5:995
91.169.12.198:32100
47.21.51.138:443
35.143.97.145:995
12.172.173.82:32101
92.20.204.198:2222
103.42.86.42:995
136.175.69.147:443
116.72.250.18:443
123.3.240.16:995
116.74.164.235:443
136.244.25.165:443
109.50.143.218:2222
86.45.66.141:2222
87.200.170.30:443
46.64.171.68:443
100.6.31.96:443
184.176.35.223:2222
23.30.22.225:50003
79.77.142.22:2222
124.149.143.189:2222
12.172.173.82:20
82.212.107.207:443
125.99.69.178:443
212.70.98.78:2222
74.66.134.24:443
122.186.210.254:443
23.30.22.225:443
74.102.98.63:2222
90.104.151.37:2222
84.155.13.118:995
77.126.185.173:443
98.145.23.67:443
162.248.14.107:443
12.172.173.82:993
93.150.183.229:2222
70.112.206.5:443
24.206.27.39:443
81.101.185.146:443
109.151.87.122:443
92.9.45.20:2222
90.55.106.37:2222
76.178.148.107:2222
75.109.111.89:443
201.244.108.183:995
47.205.25.170:443
92.27.86.48:2222
71.171.83.69:443
12.172.173.82:2087
71.38.155.217:443
172.90.139.138:2222
103.111.70.66:443
72.203.216.98:2222
12.172.173.82:50001
157.119.85.203:443
12.172.173.82:22
125.99.76.102:443
112.222.83.147:6881
85.2.185.70:2222
12.172.173.82:995
92.189.214.236:2222
85.61.165.153:2222
2.36.64.159:2078
75.149.21.157:443
78.159.147.45:995
86.225.214.138:2222
88.126.94.4:50000
41.186.88.38:443
77.86.98.236:443
88.122.133.88:32100
91.165.188.74:50000
74.92.243.115:50000
68.229.150.95:443
114.143.176.235:443
103.113.68.33:443
103.144.201.56:2078
89.129.109.27:2222
151.65.213.208:443
151.62.160.232:443
90.70.150.94:2222
24.139.11.137:443
184.182.66.109:443
23.30.22.225:993
209.216.123.118:3389
119.82.123.160:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewermgr.exepid process 1744 rundll32.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe 864 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid process 1744 rundll32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
rundll32.exerundll32.exewermgr.exedescription pid process target process PID 1148 wrote to memory of 1744 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1744 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1744 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1744 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1744 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1744 1148 rundll32.exe rundll32.exe PID 1148 wrote to memory of 1744 1148 rundll32.exe rundll32.exe PID 1744 wrote to memory of 864 1744 rundll32.exe wermgr.exe PID 1744 wrote to memory of 864 1744 rundll32.exe wermgr.exe PID 1744 wrote to memory of 864 1744 rundll32.exe wermgr.exe PID 1744 wrote to memory of 864 1744 rundll32.exe wermgr.exe PID 1744 wrote to memory of 864 1744 rundll32.exe wermgr.exe PID 1744 wrote to memory of 864 1744 rundll32.exe wermgr.exe PID 864 wrote to memory of 980 864 wermgr.exe ping.exe PID 864 wrote to memory of 980 864 wermgr.exe ping.exe PID 864 wrote to memory of 980 864 wermgr.exe ping.exe PID 864 wrote to memory of 980 864 wermgr.exe ping.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe4d2ebc920e60116b039236f07e45a9203fce4eaf7e5182c0a8610f49c7397c.dll,Nikn1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe4d2ebc920e60116b039236f07e45a9203fce4eaf7e5182c0a8610f49c7397c.dll,Nikn2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ping.exeping -n 3 yahoo.com4⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/864-67-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/864-61-0x00000000000F0000-0x00000000000F2000-memory.dmpFilesize
8KB
-
memory/864-62-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/864-63-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/864-65-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/864-66-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/864-68-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/864-69-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/864-71-0x00000000000C0000-0x00000000000E4000-memory.dmpFilesize
144KB
-
memory/1744-55-0x00000000001A0000-0x00000000001C4000-memory.dmpFilesize
144KB
-
memory/1744-60-0x00000000001A0000-0x00000000001C4000-memory.dmpFilesize
144KB
-
memory/1744-64-0x00000000001A0000-0x00000000001C4000-memory.dmpFilesize
144KB
-
memory/1744-54-0x0000000000170000-0x0000000000173000-memory.dmpFilesize
12KB