Analysis
-
max time kernel
137s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 11:05
Static task
static1
Behavioral task
behavioral1
Sample
0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll
Resource
win7-20231215-en
General
-
Target
0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll
-
Size
1.0MB
-
MD5
0fe8ae3cab77dc2e1e0f6bc47f9c94bc
-
SHA1
b9860b8b36735fc0b37472ef4de0b1510fbb61b0
-
SHA256
238fa968ea18bf8ee6737880083f39c3b239c91084bbf6dafa23eb050f31b3f9
-
SHA512
8818f1a60d192384059e084206f95cabb06b186422c1dd1904b9b47ef7e5ae07729eceb70908fb9c4a4102a3597faad19d47451e3962a259b2727eae45a3e28a
-
SSDEEP
24576:vPmUt5u2f8THLYM2UGGcOzDDqkB02DRbNRYilN3xa0vvw6xPrvuygaPkbDf59cMZ:HmKutTHLYMXrDuwprRYilN3xa0vvw6lT
Malware Config
Extracted
qakbot
402.363
obama110
1633507384
96.57.188.174:2078
94.200.181.154:443
217.17.56.163:2222
122.11.220.212:2222
2.222.167.138:443
209.50.20.255:443
167.248.117.81:443
187.116.124.82:995
73.52.50.32:443
120.151.47.189:443
181.118.183.94:443
89.101.97.139:443
188.210.210.122:0
81.241.252.59:2078
202.134.178.157:443
75.75.179.226:443
120.150.218.241:995
185.250.148.74:443
81.250.153.227:2222
66.103.170.104:2222
174.54.193.186:443
76.25.142.196:443
136.232.34.70:443
37.210.152.224:995
216.201.162.158:443
140.82.49.12:443
66.177.215.152:443
89.137.52.44:443
73.230.205.91:443
74.72.237.54:443
41.228.22.180:443
115.96.53.68:443
78.191.58.219:995
103.142.10.177:443
202.165.32.158:2222
173.21.10.71:2222
103.148.120.144:443
39.52.229.8:995
42.60.70.14:443
71.74.12.34:443
73.151.236.31:443
73.140.38.124:443
67.165.206.193:993
47.40.196.233:2222
72.252.201.69:443
167.248.100.227:443
24.55.112.61:443
201.93.111.2:995
177.94.125.59:995
109.12.111.14:443
70.37.217.196:443
181.4.53.6:465
167.248.23.224:443
69.30.186.190:443
189.131.221.201:443
24.139.72.117:443
24.229.150.54:995
68.204.7.158:443
188.55.235.110:995
181.84.114.46:443
167.248.99.149:443
177.94.21.110:995
50.54.32.149:443
189.224.181.39:443
45.46.53.140:2222
75.188.35.168:443
24.119.214.7:443
63.70.164.200:995
2.99.100.134:2222
86.8.177.143:443
73.130.180.25:443
124.123.42.115:2222
217.17.56.163:2078
162.244.227.34:443
75.66.88.33:443
47.22.148.6:443
162.210.220.137:443
206.47.134.234:2222
63.70.164.200:443
167.248.54.34:2222
73.77.87.137:443
181.4.53.6:443
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
68.186.192.69:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
159.2.51.200:2222
110.174.64.179:995
187.101.25.96:32100
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
97.98.130.50:443
196.117.224.53:995
77.57.204.78:443
191.191.38.8:443
188.210.210.122:443
96.46.103.109:2222
37.117.191.19:2222
197.90.137.161:61201
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
217.17.56.163:443
62.23.194.38:443
62.23.194.41:995
199.27.127.129:443
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Vuzjh = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Fiecehn = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 2876 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\7088212 = f84382f15f1ec49bdd63d158dc193e8798817fac5a89d09aa67b341d4b32e34f7093a5549dd2242dd3486f0d2642665fc590d199fe0109f642cfc5aa63981ac57734fec21ce472229ed9f6a7752417b6dce84a667d5da0c01717e38b3f138f5e6d2ad71345363773fae6d26dc0013e83e74a8f483b14554a73d04d6ac6c80576e1431511bf3e3357b5f3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\7841ede4 = 9beb7c1290c1a80f817299630eb233f1ead6917d6a1cf49b67ba175bd71c9d2ce717c6337579eea91984c9a39dff9ce967ef4cc9ee0e390680ac20e054953f9615bbd0be62f5d5b6ecaf06e07080a7cf3495685cb621e0e4219244214de5492bbaa9fd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\bfb4e577 = 142af0b7bcdfa6d22aade64faeb87e6d01026b3f10a78aabff40475cc10d0b066fe27b352632789cb86a640fce445eebecc05d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\3297525c = da050ee753a12cea62234ca3288859823342322501af8e52fdcb367f8031d7cf9323cbe23a8379cbe89283e1fe7724f087977e539464cac5c786eb5b9d explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\3297525c = da0519e753a11983c552eaa716851c2543eb5414ae0f8997bdd829ecc3d511286f1e458d030eb820 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\549a26e = 229c5d7394bb0d30e1bd9c9027a4581c878160d15073d95ad4a4bd93d877daccbc374d80a529d4f269eb2bee942987aa16eb99a31c2e273aff5e318b7931332e8f51d003db69009206f51d1be9ea6ebe497393b4a846f1976b97df1cf9aee8d4a6f1f88ae8ffba2d5005ab556d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\bdf5c50b = 647b53732a17883108e9a968a0c185972ad1e30b9414b98aad450252447fd661907b2e98b2fc3e721ce96f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\c0fd8a81 = 97a8d7ec40581bc88045c7260ad5c5a5a51af8742b570465366bc569a7b9be18aca3728ff1ccf2834121894d213f36d9f47b745700b1e76da279ac4d9fff6ed3e855f2d28156543e9060ba05ba2e2357ef50f425219c784765777c93759638c76f39b6c3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yzngfcmaeduqjo\4dde3daa = ff06256462e3c353f30bfa518241f2279129070fc0 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 1708 rundll32.exe 2876 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 1708 rundll32.exe 2876 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 1544 wrote to memory of 1708 1544 rundll32.exe 28 PID 1544 wrote to memory of 1708 1544 rundll32.exe 28 PID 1544 wrote to memory of 1708 1544 rundll32.exe 28 PID 1544 wrote to memory of 1708 1544 rundll32.exe 28 PID 1544 wrote to memory of 1708 1544 rundll32.exe 28 PID 1544 wrote to memory of 1708 1544 rundll32.exe 28 PID 1544 wrote to memory of 1708 1544 rundll32.exe 28 PID 1708 wrote to memory of 2784 1708 rundll32.exe 29 PID 1708 wrote to memory of 2784 1708 rundll32.exe 29 PID 1708 wrote to memory of 2784 1708 rundll32.exe 29 PID 1708 wrote to memory of 2784 1708 rundll32.exe 29 PID 1708 wrote to memory of 2784 1708 rundll32.exe 29 PID 1708 wrote to memory of 2784 1708 rundll32.exe 29 PID 2784 wrote to memory of 2484 2784 explorer.exe 30 PID 2784 wrote to memory of 2484 2784 explorer.exe 30 PID 2784 wrote to memory of 2484 2784 explorer.exe 30 PID 2784 wrote to memory of 2484 2784 explorer.exe 30 PID 3060 wrote to memory of 3064 3060 taskeng.exe 35 PID 3060 wrote to memory of 3064 3060 taskeng.exe 35 PID 3060 wrote to memory of 3064 3060 taskeng.exe 35 PID 3060 wrote to memory of 3064 3060 taskeng.exe 35 PID 3060 wrote to memory of 3064 3060 taskeng.exe 35 PID 3064 wrote to memory of 2876 3064 regsvr32.exe 36 PID 3064 wrote to memory of 2876 3064 regsvr32.exe 36 PID 3064 wrote to memory of 2876 3064 regsvr32.exe 36 PID 3064 wrote to memory of 2876 3064 regsvr32.exe 36 PID 3064 wrote to memory of 2876 3064 regsvr32.exe 36 PID 3064 wrote to memory of 2876 3064 regsvr32.exe 36 PID 3064 wrote to memory of 2876 3064 regsvr32.exe 36 PID 2876 wrote to memory of 2748 2876 regsvr32.exe 37 PID 2876 wrote to memory of 2748 2876 regsvr32.exe 37 PID 2876 wrote to memory of 2748 2876 regsvr32.exe 37 PID 2876 wrote to memory of 2748 2876 regsvr32.exe 37 PID 2876 wrote to memory of 2748 2876 regsvr32.exe 37 PID 2876 wrote to memory of 2748 2876 regsvr32.exe 37 PID 2748 wrote to memory of 2156 2748 explorer.exe 38 PID 2748 wrote to memory of 2156 2748 explorer.exe 38 PID 2748 wrote to memory of 2156 2748 explorer.exe 38 PID 2748 wrote to memory of 2156 2748 explorer.exe 38 PID 2748 wrote to memory of 2988 2748 explorer.exe 40 PID 2748 wrote to memory of 2988 2748 explorer.exe 40 PID 2748 wrote to memory of 2988 2748 explorer.exe 40 PID 2748 wrote to memory of 2988 2748 explorer.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn trwczcfg /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll\"" /SC ONCE /Z /ST 14:50 /ET 15:024⤵
- Creates scheduled task(s)
PID:2484
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3203A703-DA99-4B29-A5D6-3B4E8C1B2FC0} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Vuzjh" /d "0"5⤵
- Windows security bypass
PID:2156
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Fiecehn" /d "0"5⤵
- Windows security bypass
PID:2988
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD50fe8ae3cab77dc2e1e0f6bc47f9c94bc
SHA1b9860b8b36735fc0b37472ef4de0b1510fbb61b0
SHA256238fa968ea18bf8ee6737880083f39c3b239c91084bbf6dafa23eb050f31b3f9
SHA5128818f1a60d192384059e084206f95cabb06b186422c1dd1904b9b47ef7e5ae07729eceb70908fb9c4a4102a3597faad19d47451e3962a259b2727eae45a3e28a