Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 11:05
Static task
static1
Behavioral task
behavioral1
Sample
0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll
Resource
win7-20231215-en
General
-
Target
0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll
-
Size
1.0MB
-
MD5
0fe8ae3cab77dc2e1e0f6bc47f9c94bc
-
SHA1
b9860b8b36735fc0b37472ef4de0b1510fbb61b0
-
SHA256
238fa968ea18bf8ee6737880083f39c3b239c91084bbf6dafa23eb050f31b3f9
-
SHA512
8818f1a60d192384059e084206f95cabb06b186422c1dd1904b9b47ef7e5ae07729eceb70908fb9c4a4102a3597faad19d47451e3962a259b2727eae45a3e28a
-
SSDEEP
24576:vPmUt5u2f8THLYM2UGGcOzDDqkB02DRbNRYilN3xa0vvw6xPrvuygaPkbDf59cMZ:HmKutTHLYMXrDuwprRYilN3xa0vvw6lT
Malware Config
Extracted
qakbot
402.363
obama110
1633507384
96.57.188.174:2078
94.200.181.154:443
217.17.56.163:2222
122.11.220.212:2222
2.222.167.138:443
209.50.20.255:443
167.248.117.81:443
187.116.124.82:995
73.52.50.32:443
120.151.47.189:443
181.118.183.94:443
89.101.97.139:443
188.210.210.122:0
81.241.252.59:2078
202.134.178.157:443
75.75.179.226:443
120.150.218.241:995
185.250.148.74:443
81.250.153.227:2222
66.103.170.104:2222
174.54.193.186:443
76.25.142.196:443
136.232.34.70:443
37.210.152.224:995
216.201.162.158:443
140.82.49.12:443
66.177.215.152:443
89.137.52.44:443
73.230.205.91:443
74.72.237.54:443
41.228.22.180:443
115.96.53.68:443
78.191.58.219:995
103.142.10.177:443
202.165.32.158:2222
173.21.10.71:2222
103.148.120.144:443
39.52.229.8:995
42.60.70.14:443
71.74.12.34:443
73.151.236.31:443
73.140.38.124:443
67.165.206.193:993
47.40.196.233:2222
72.252.201.69:443
167.248.100.227:443
24.55.112.61:443
201.93.111.2:995
177.94.125.59:995
109.12.111.14:443
70.37.217.196:443
181.4.53.6:465
167.248.23.224:443
69.30.186.190:443
189.131.221.201:443
24.139.72.117:443
24.229.150.54:995
68.204.7.158:443
188.55.235.110:995
181.84.114.46:443
167.248.99.149:443
177.94.21.110:995
50.54.32.149:443
189.224.181.39:443
45.46.53.140:2222
75.188.35.168:443
24.119.214.7:443
63.70.164.200:995
2.99.100.134:2222
86.8.177.143:443
73.130.180.25:443
124.123.42.115:2222
217.17.56.163:2078
162.244.227.34:443
75.66.88.33:443
47.22.148.6:443
162.210.220.137:443
206.47.134.234:2222
63.70.164.200:443
167.248.54.34:2222
73.77.87.137:443
181.4.53.6:443
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
68.186.192.69:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
159.2.51.200:2222
110.174.64.179:995
187.101.25.96:32100
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
97.98.130.50:443
196.117.224.53:995
77.57.204.78:443
191.191.38.8:443
188.210.210.122:443
96.46.103.109:2222
37.117.191.19:2222
197.90.137.161:61201
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
217.17.56.163:443
62.23.194.38:443
62.23.194.41:995
199.27.127.129:443
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Ojaoii = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Ccuvyi = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 4712 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4256 schtasks.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\f62de10a = d12dc2fbd0e799dcffe49831f38dc292f3a6c2636b547080fc19 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\31d8e999 = 5bbd9aa53352cf6341d9da1b147065185fd2ba3fa8f741ddd227b88585aa7eff7e419ff8e5ce06a8c7c9a201d85bbb5864258182ba721d129e6d1abca797d47bd18f5d15c25cb2350b1a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\bcfb5eb2 = b719c9f3324b741cff335552bdba2fb6e3d6398b2d88ad98dc4057540e2262a78c240e318adf13485c27dd05684dcb80cb8d1824404fb82eb20c207e5169bf1c226b7a037e4f091baaba2e39b896e5ac78928c5bdf16ab3dfc261eb415258699ba7a9c6da4e452bb20b52cbe06bdd4 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\bcfb5eb2 = b719def3324b41ffd264559a6d5043187da094ca0717868449067863590ad00b3b1de80d506b9e59e541a8a48dbec52ac568884de9e81d91bae9d1025c9659841e4f90ae52ce2d73ad34dc0b3c58f81bdcd0625f075459579a71 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\8b25ae80 = 375108cd17584db748a4d7ae6cad7faedf42842f96f10e412ac8ebb2ccac7d3af53c46fb2568048cae728fa5d4137dc25f1eec4a5aaf319b527398e9d7fd0a55a8ff296d77b4e05a2ddab4f2bb7027165bd891e25bcbff05f70d165f71e94d8bccaa5b794787f0d56ac2b94af25708 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\c3b23144 = f73b3b8eb776c865c023cf3fd5180d90874c2f10fe7adbfb184ebd2f897889e736edded6cccacf95e8f02a2f94a3b3335fa901b097a1210658bc6fcd9677cfa49eb3bd13d5133fbdfe3e01e96f53272b4d31d07c1ebdbbe17882739dd1edf3b78cbff40ec1bc explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\89648efc = 2f122e09ada4ef55956fd95ffe37586e8522b42111738c6dd03aee85f413759dcacfaddc37340ad6963613d456158cd2aa77830725c4e055c30ca504816e115120d7dc06856b65c7f7cff92b222006f1972448a439b2681e352896dc9b2e4cc93475b4ff53297d5e20241379b337351c6e754a170922a361ac42fc0bb2ab654c7abc8da1989d68c4e98d944d77112f86616ccdf7ebde3ab2d950e37e9c2a18d28bceeaf3851ed6e94b295fba7f7dd25ea2c6ed68fc9e647d9b3e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\3399c9e5 = dbbbc133aecf6be7909da71662b7905d67964831cac24b59ab64a4e812cf84eee41c0a90ec5038df9bbb explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yhymieufoyizh\4e91866f = 0d06058fc080c5a0228fcaba0fed82e8a319295d3648a3d625100167d113af5a5c883676de2df15d02142d2211ed00da5441e55ce19abc78eba74eba9c20d60ff60a69a635a50f45c35fa3da252e explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4912 rundll32.exe 4912 rundll32.exe 4712 regsvr32.exe 4712 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4912 rundll32.exe 4712 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1440 wrote to memory of 4912 1440 rundll32.exe 19 PID 1440 wrote to memory of 4912 1440 rundll32.exe 19 PID 1440 wrote to memory of 4912 1440 rundll32.exe 19 PID 4912 wrote to memory of 2672 4912 rundll32.exe 94 PID 4912 wrote to memory of 2672 4912 rundll32.exe 94 PID 4912 wrote to memory of 2672 4912 rundll32.exe 94 PID 4912 wrote to memory of 2672 4912 rundll32.exe 94 PID 4912 wrote to memory of 2672 4912 rundll32.exe 94 PID 2672 wrote to memory of 4256 2672 explorer.exe 96 PID 2672 wrote to memory of 4256 2672 explorer.exe 96 PID 2672 wrote to memory of 4256 2672 explorer.exe 96 PID 3172 wrote to memory of 4712 3172 regsvr32.exe 102 PID 3172 wrote to memory of 4712 3172 regsvr32.exe 102 PID 3172 wrote to memory of 4712 3172 regsvr32.exe 102 PID 4712 wrote to memory of 2608 4712 regsvr32.exe 103 PID 4712 wrote to memory of 2608 4712 regsvr32.exe 103 PID 4712 wrote to memory of 2608 4712 regsvr32.exe 103 PID 4712 wrote to memory of 2608 4712 regsvr32.exe 103 PID 4712 wrote to memory of 2608 4712 regsvr32.exe 103 PID 2608 wrote to memory of 4524 2608 explorer.exe 104 PID 2608 wrote to memory of 4524 2608 explorer.exe 104 PID 2608 wrote to memory of 2012 2608 explorer.exe 107 PID 2608 wrote to memory of 2012 2608 explorer.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn bdpfilunfg /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll\"" /SC ONCE /Z /ST 14:50 /ET 15:024⤵
- Creates scheduled task(s)
PID:4256
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\0fe8ae3cab77dc2e1e0f6bc47f9c94bc.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ojaoii" /d "0"4⤵
- Windows security bypass
PID:4524
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ccuvyi" /d "0"4⤵
- Windows security bypass
PID:2012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5d0510d1699a089ccb2e9a86f130a1f2c
SHA15a2fa2234f47e1ae09830439d2b7a92d25dd1019
SHA25674af3863322b592fbe0752b0a3cd842234fc9fff27ae453b5ba0727dcd806ac0
SHA51296a554141344a60a6a9ebd55582262c37e6e096715400295d7f19484f359c970693e269a93f912b0b82698d5835b7b31884df03ca51fd4beeafd7ba3a9cf3809
-
Filesize
1.0MB
MD50fe8ae3cab77dc2e1e0f6bc47f9c94bc
SHA1b9860b8b36735fc0b37472ef4de0b1510fbb61b0
SHA256238fa968ea18bf8ee6737880083f39c3b239c91084bbf6dafa23eb050f31b3f9
SHA5128818f1a60d192384059e084206f95cabb06b186422c1dd1904b9b47ef7e5ae07729eceb70908fb9c4a4102a3597faad19d47451e3962a259b2727eae45a3e28a