Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2023, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
Elected.dll
Resource
win7-20230220-en
General
-
Target
Elected.dll
-
Size
999KB
-
MD5
63463b4263c923f228d5522cab5c4073
-
SHA1
5861e518755eedd5b9206b013e6e3500a42da6ed
-
SHA256
5f055b2ee3364f00afe1496ee6539a964cd02633aa737da81f54db4b82250242
-
SHA512
07c6c0f4e87ab1e1e73f430c7355dc93a21833676204499e6853554219197f994df4b77b9547c5d0fa8ee67c1157e08a5101f8d2db56a6ac398bfd5a20637e7e
-
SSDEEP
12288:UjYxnjXcBIlezoQy41hY1eOuQxb64XpyUJM64eMr4JlMxx8Q484xvVAc+IFBNp:UUpcBSf4IeOlbrooi4JluqMQl
Malware Config
Extracted
qakbot
404.1038
BB28
1684145503
74.33.196.114:443
108.190.115.159:443
47.21.51.138:443
76.16.49.134:443
113.11.92.30:443
98.19.234.243:995
197.14.208.59:443
88.126.94.4:50000
24.69.137.232:2222
70.28.50.223:32100
184.176.35.223:2222
12.172.173.82:50001
87.202.101.164:50000
70.28.50.223:2087
75.109.111.89:443
86.130.9.227:2222
12.172.173.82:32101
70.28.50.223:3389
80.12.88.148:2222
174.118.68.176:443
75.98.154.19:443
125.99.69.178:443
96.87.28.170:2222
96.56.197.26:2222
86.140.160.231:2222
86.195.14.72:2222
47.205.25.170:443
103.42.86.42:995
12.172.173.82:465
50.68.204.71:993
173.88.135.179:443
105.101.110.37:443
75.143.236.149:443
70.50.83.139:2222
84.215.202.8:443
84.35.26.14:995
12.172.173.82:21
78.92.133.215:443
31.53.29.198:2222
86.178.33.63:2222
217.44.108.89:2222
100.6.31.96:443
92.239.81.124:443
37.14.229.220:2222
172.115.17.50:443
103.141.50.79:995
105.186.242.203:995
92.1.170.110:995
89.79.229.50:443
200.109.16.12:2222
103.140.174.20:2222
91.75.114.200:443
102.156.218.92:443
91.2.143.185:995
90.165.109.4:2222
85.152.152.46:443
182.185.181.202:995
65.190.242.244:443
122.186.210.254:443
58.162.223.233:443
98.145.23.67:443
41.186.88.38:443
139.226.47.229:995
12.172.173.82:993
197.148.17.17:2078
43.243.215.210:443
178.152.124.169:443
50.68.204.71:443
217.165.234.249:443
116.74.164.93:443
184.153.132.82:443
69.133.162.35:443
162.248.14.107:443
50.68.204.71:995
186.64.67.41:443
89.114.140.100:443
109.50.128.59:2222
12.172.173.82:2087
92.20.204.198:2222
79.26.184.19:443
35.143.97.145:995
161.142.98.36:995
27.109.19.90:2078
174.4.89.3:443
73.29.92.128:443
103.123.223.171:443
173.22.114.208:443
70.160.67.203:443
12.172.173.82:22
47.149.248.80:443
40.134.85.217:443
71.38.155.217:443
86.176.16.18:443
125.99.76.102:443
79.77.142.22:2222
66.191.69.18:995
178.175.187.254:443
76.170.252.153:995
176.142.207.63:443
85.104.98.64:443
87.243.146.59:443
70.28.50.223:2078
76.86.31.59:443
71.78.95.86:995
92.9.45.20:2222
198.2.51.242:993
81.229.117.95:2222
92.98.159.9:2222
202.184.123.13:443
201.244.108.183:995
72.205.104.134:443
50.68.186.195:443
103.87.128.228:443
90.104.151.37:2222
12.172.173.82:20
70.28.50.223:2083
92.27.86.48:2222
157.119.85.203:443
122.184.143.86:443
186.75.103.188:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 992 4432 WerFault.exe 84 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 456 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4924 PowerShell.exe 4924 PowerShell.exe 4852 rundll32.exe 4852 rundll32.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe 648 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4852 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4924 PowerShell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4432 3524 rundll32.exe 84 PID 3524 wrote to memory of 4432 3524 rundll32.exe 84 PID 3524 wrote to memory of 4432 3524 rundll32.exe 84 PID 4924 wrote to memory of 3464 4924 PowerShell.exe 101 PID 4924 wrote to memory of 3464 4924 PowerShell.exe 101 PID 3464 wrote to memory of 4852 3464 rundll32.exe 102 PID 3464 wrote to memory of 4852 3464 rundll32.exe 102 PID 3464 wrote to memory of 4852 3464 rundll32.exe 102 PID 4852 wrote to memory of 648 4852 rundll32.exe 103 PID 4852 wrote to memory of 648 4852 rundll32.exe 103 PID 4852 wrote to memory of 648 4852 rundll32.exe 103 PID 4852 wrote to memory of 648 4852 rundll32.exe 103 PID 4852 wrote to memory of 648 4852 rundll32.exe 103 PID 648 wrote to memory of 456 648 wermgr.exe 104 PID 648 wrote to memory of 456 648 wermgr.exe 104 PID 648 wrote to memory of 456 648 wermgr.exe 104
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Elected.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Elected.dll,#12⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 5963⤵
- Program crash
PID:992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4432 -ip 44321⤵PID:3296
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5020
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp'1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" .\Elected.dll,print2⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" .\Elected.dll,print3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\ping.exeping -n 3 yahoo.com5⤵
- Runs ping.exe
PID:456
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82