Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 21:36
Static task
static1
Behavioral task
behavioral1
Sample
a7c0c6bf571abf5de7d8d6e7131c2ad9.dll
Resource
win7-20231215-en
General
-
Target
a7c0c6bf571abf5de7d8d6e7131c2ad9.dll
-
Size
431KB
-
MD5
a7c0c6bf571abf5de7d8d6e7131c2ad9
-
SHA1
804ad99fbf3636a5cec3e2c242698db2feb726ab
-
SHA256
d6b72a3b670cb4bf967247032193169b6530ef8145bdef72e986ac817a7577cc
-
SHA512
7612c10bb07b8581f9669859a42b27e2f8f12aa1e96baa1fe65b1d07daba3bebff6696811383fb442d3554154705724030ae4f1a33864b012c5ad73e0400d7d1
-
SSDEEP
6144:dENSSm9kFIxN8yzjJbszIARC7I+8Gbcbfu4Vj6m+Ogu55wL/JYCDwrP:dEMSK4x4jBDARsTdgq4kmNguUL/SCiP
Malware Config
Extracted
qakbot
402.363
tr
1632817399
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
120.151.47.189:443
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
76.25.142.196:443
181.118.183.94:443
120.150.218.241:995
185.250.148.74:443
95.77.223.148:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
105.157.55.133:995
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Clsyjyrnll = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Ohyiixfnld = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 4480 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\4a0c6102 = 5ff3404c8ea039cbeb6e822e39a6cac704b877641cafa9b43d926bc5cba24e106ad2b12371908f3689996f017b96d96a94400716ad8e6eae5103d370cd03c9d86b0272fa4eee12514d4ba287d9b07defc36e4d66e5d224671afa93902aff830ed8be4563c5446739dcafb8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\f2b00667 = 2c5a3f8089d64a0f76426c4889c87784bd7f2acee5cda4777c399572a1f6b6c3ac807656ad3aa02130fb7631d2a8ca4edd8055c3f3d0427423e5fb57 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\8fb849ed = 1570536ea5b00571dea8a6a3186ad19b19b3318837a382ec228946e4f56fb62c4f35d91ee574abe5562cf798803181e0676d6411a100479811666d2afa074f8babca3da61728e37b98b63d484abacdaab5cce9960e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\37042e88 = 26e9ebac7e60960f23a004fb9437169ff5a12bd01e16094daff8a998dc5a9894b456b0a19d8278afd8210270298c21bd28a5aaf4394669a962e68f45f360c6f2e44ca79d45730bf455e688c155405827b4a5d0c2b018c033f0c272f65bb8b6456702650995a03c2a56d14828 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\29bfec6 = 21af1887ec0c0d36631e4e6e846da8306619350ab644ba0dbaf186569e2c46890b688862acd08ab611a35431b01855c97fa6322939d4636076c2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\7dd29130 = 668288ec4616e523a4e19d60859490e4 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\484d417e = f97169aa495b44b5783694d55bdf6712dcffd423bd5c9caed646096942890850f0551b3a110a8b817b7883e0754b385032e31c34d1263a3d1556d4355b2eb75785ff963a98066681ee6518caac63dd7726270f2e68487c425ac71f81235c6c8a20eef23edc6a2ecba843356dd1392b9ac0daecea38aab48376842356c59a6bfaed530c4233346adef0b2362dea4c494356df127635 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\f0f1261b = 3ea405a0a050d9a4ebf408ddde193dd34d51dab83969db70eb7e0ae5cacd9643e085d0ac9ef21135fa6de3507fc7f57c explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Igyhuisdoy\7dd29130 = 66829fec4616d0b85730044576477364a2fdc077d2886715352e42ac79ba060c3ff58a487f explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 3184 rundll32.exe 3184 rundll32.exe 4480 regsvr32.exe 4480 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 3184 rundll32.exe 4480 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 2620 wrote to memory of 3184 2620 rundll32.exe 14 PID 2620 wrote to memory of 3184 2620 rundll32.exe 14 PID 2620 wrote to memory of 3184 2620 rundll32.exe 14 PID 3184 wrote to memory of 3708 3184 rundll32.exe 95 PID 3184 wrote to memory of 3708 3184 rundll32.exe 95 PID 3184 wrote to memory of 3708 3184 rundll32.exe 95 PID 3184 wrote to memory of 3708 3184 rundll32.exe 95 PID 3184 wrote to memory of 3708 3184 rundll32.exe 95 PID 3708 wrote to memory of 2132 3708 explorer.exe 96 PID 3708 wrote to memory of 2132 3708 explorer.exe 96 PID 3708 wrote to memory of 2132 3708 explorer.exe 96 PID 984 wrote to memory of 4480 984 regsvr32.exe 106 PID 984 wrote to memory of 4480 984 regsvr32.exe 106 PID 984 wrote to memory of 4480 984 regsvr32.exe 106 PID 4480 wrote to memory of 3900 4480 regsvr32.exe 107 PID 4480 wrote to memory of 3900 4480 regsvr32.exe 107 PID 4480 wrote to memory of 3900 4480 regsvr32.exe 107 PID 4480 wrote to memory of 3900 4480 regsvr32.exe 107 PID 4480 wrote to memory of 3900 4480 regsvr32.exe 107 PID 3900 wrote to memory of 4208 3900 explorer.exe 108 PID 3900 wrote to memory of 4208 3900 explorer.exe 108 PID 3900 wrote to memory of 560 3900 explorer.exe 110 PID 3900 wrote to memory of 560 3900 explorer.exe 110
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7c0c6bf571abf5de7d8d6e7131c2ad9.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn pxhsriochz /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\a7c0c6bf571abf5de7d8d6e7131c2ad9.dll\"" /SC ONCE /Z /ST 16:28 /ET 16:403⤵
- Creates scheduled task(s)
PID:2132
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7c0c6bf571abf5de7d8d6e7131c2ad9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2620
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\a7c0c6bf571abf5de7d8d6e7131c2ad9.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\a7c0c6bf571abf5de7d8d6e7131c2ad9.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Clsyjyrnll" /d "0"4⤵
- Windows security bypass
PID:4208
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ohyiixfnld" /d "0"4⤵
- Windows security bypass
PID:560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD5a7c0c6bf571abf5de7d8d6e7131c2ad9
SHA1804ad99fbf3636a5cec3e2c242698db2feb726ab
SHA256d6b72a3b670cb4bf967247032193169b6530ef8145bdef72e986ac817a7577cc
SHA5127612c10bb07b8581f9669859a42b27e2f8f12aa1e96baa1fe65b1d07daba3bebff6696811383fb442d3554154705724030ae4f1a33864b012c5ad73e0400d7d1