Analysis
-
max time kernel
26s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
45fbfb9658cbfd1fe2fa102cf05bd38f458864e3f39f2c72dc4b073b114a2e24.dll
Resource
win7-20230220-en
General
-
Target
45fbfb9658cbfd1fe2fa102cf05bd38f458864e3f39f2c72dc4b073b114a2e24.dll
-
Size
336KB
-
MD5
64ad73dd7f791257e336a550338a7e96
-
SHA1
e94fa4a9217a51488f688aaa6ab84d23ba4529af
-
SHA256
45fbfb9658cbfd1fe2fa102cf05bd38f458864e3f39f2c72dc4b073b114a2e24
-
SHA512
117a67c89669783243f01686705f6f4ea9c4aa01b973a47037b7d85d3f932ac881eccd938be2690bab7d24fb737b56b6269467ecc367d45da11f5f3faa22bfc2
-
SSDEEP
6144:rGpptTq76Et/NPHn1PdjxFJwMoW9vTWF5K6bVt2Eyfs/nqlbbHyx2f8qo+AwrOE:rG7Nq76qPVltfTvTWF5K6zPyfsyZ+x29
Malware Config
Extracted
qakbot
404.919
BB23
1681291772
101.184.134.98:2222
23.30.22.225:993
104.35.24.154:443
85.2.185.70:2222
14.192.241.76:995
47.196.225.236:443
78.92.133.215:443
176.202.45.209:443
174.118.63.123:443
84.35.26.14:995
86.171.191.31:443
103.141.50.79:995
213.67.139.53:2222
172.115.17.50:443
198.2.51.242:993
69.133.162.35:443
58.162.223.233:443
91.169.12.198:32100
47.21.51.138:443
35.143.97.145:995
12.172.173.82:32101
64.121.161.102:443
70.28.50.223:1194
49.245.95.124:2222
70.28.50.223:3389
65.190.242.244:443
102.158.69.237:443
72.205.104.134:443
103.42.86.42:995
108.32.72.145:443
70.28.50.223:2087
24.236.90.196:2078
14.200.181.108:443
91.165.188.74:50000
122.184.143.83:443
78.192.109.105:2222
50.68.204.71:443
161.142.103.5:995
213.91.235.146:443
95.60.243.61:995
50.68.204.71:993
72.134.124.16:443
71.31.232.65:995
99.228.131.116:2222
50.68.186.195:443
90.4.110.221:2222
125.99.76.102:443
75.143.236.149:443
85.241.180.94:443
209.93.207.224:2222
109.50.143.218:2222
139.226.47.229:995
43.243.215.210:443
103.78.55.136:443
76.170.252.153:995
70.28.50.223:2083
86.180.120.159:2222
184.153.132.82:443
90.104.151.37:2222
84.155.13.118:995
71.31.100.192:443
98.145.23.67:443
77.126.185.173:443
12.172.173.82:993
70.112.206.5:443
24.206.27.39:443
86.99.79.136:2222
178.175.187.254:443
90.55.106.37:2222
86.98.23.66:443
125.99.69.178:443
92.9.45.20:2222
23.30.22.225:50003
79.77.142.22:2222
98.37.25.99:443
37.166.25.168:21
122.186.210.254:443
184.176.35.223:2222
136.244.25.165:443
86.45.66.141:2222
12.172.173.82:20
27.109.19.90:2078
162.248.14.107:443
109.159.118.107:2222
79.42.241.244:443
88.122.133.88:32100
212.70.98.78:2222
116.72.250.18:443
74.66.134.24:443
23.30.22.225:443
151.62.160.232:443
136.232.184.134:995
76.80.180.154:993
92.189.214.236:2222
78.159.145.17:995
86.225.214.138:2222
88.126.94.4:50000
96.87.28.170:2222
74.92.243.115:50000
72.200.109.104:443
75.109.111.89:443
157.119.85.203:443
201.244.108.183:995
86.130.9.222:2222
71.171.83.69:443
68.173.170.110:8443
47.205.25.170:443
89.129.109.27:2222
92.239.81.124:443
172.248.42.122:443
71.38.155.217:443
172.90.139.138:2222
41.227.217.128:443
92.149.250.113:2222
12.172.173.82:50001
12.172.173.82:22
213.240.106.71:995
105.184.209.37:995
12.172.173.82:2087
107.146.12.26:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1176 ping.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4908 rundll32.exe 4908 rundll32.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe 1324 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4908 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4908 1832 rundll32.exe 85 PID 1832 wrote to memory of 4908 1832 rundll32.exe 85 PID 1832 wrote to memory of 4908 1832 rundll32.exe 85 PID 4908 wrote to memory of 1324 4908 rundll32.exe 86 PID 4908 wrote to memory of 1324 4908 rundll32.exe 86 PID 4908 wrote to memory of 1324 4908 rundll32.exe 86 PID 4908 wrote to memory of 1324 4908 rundll32.exe 86 PID 4908 wrote to memory of 1324 4908 rundll32.exe 86 PID 1324 wrote to memory of 1176 1324 wermgr.exe 87 PID 1324 wrote to memory of 1176 1324 wermgr.exe 87 PID 1324 wrote to memory of 1176 1324 wermgr.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45fbfb9658cbfd1fe2fa102cf05bd38f458864e3f39f2c72dc4b073b114a2e24.dll,Nikn1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45fbfb9658cbfd1fe2fa102cf05bd38f458864e3f39f2c72dc4b073b114a2e24.dll,Nikn2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\ping.exeping -n 3 yahoo.com4⤵
- Runs ping.exe
PID:1176
-
-
-