Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
18560d526a5134a7674aeacb02c1ca7f.dll
Resource
win7-20231201-en
General
-
Target
18560d526a5134a7674aeacb02c1ca7f.dll
-
Size
1.0MB
-
MD5
18560d526a5134a7674aeacb02c1ca7f
-
SHA1
f150b2068c282d8fafd02b15fec005fa89cd28b3
-
SHA256
8f604242dfb785e324e8207b35f8ce7261436f79cd8b19659a2f194333f31d6f
-
SHA512
319cbd6f8f2d75d87a7b2b801f1debe559b7d62b713072e454a1b59ee6f5afa041c3ee45c23bfc0b54f205b76f23878f5b5c8b99a193c76464e383c7120ee834
-
SSDEEP
24576:OtLNXJb227NHokpLKVtVvEMkOgPSFrHEjX7hWHQ/uYT/jISlzfmXbC1DCU:0LNXhlFBpL+vEMCPQDWX7hWHQ/ue/jIW
Malware Config
Extracted
qakbot
402.363
tr
1633334141
75.75.179.226:443
185.250.148.74:443
122.11.220.212:2222
120.150.218.241:995
103.148.120.144:443
140.82.49.12:443
40.131.140.155:995
206.47.134.234:2222
73.230.205.91:443
190.198.206.189:2222
103.157.122.198:995
81.250.153.227:2222
167.248.100.227:443
96.57.188.174:2078
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
136.232.34.70:443
68.186.192.69:443
167.248.111.245:443
81.241.252.59:2078
94.200.181.154:443
47.22.148.6:443
208.89.170.179:443
73.77.87.137:443
96.46.103.226:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
109.12.111.14:443
216.201.162.158:443
73.25.124.140:2222
181.118.183.94:443
174.54.58.170:443
24.152.219.253:995
124.123.42.115:2222
76.25.142.196:443
45.46.53.140:2222
37.210.152.224:995
173.21.10.71:2222
68.13.157.69:0
75.89.195.186:995
67.165.206.193:993
71.74.12.34:443
24.119.214.7:443
75.66.88.33:443
73.151.236.31:443
89.101.97.139:443
159.2.51.200:2222
78.191.36.142:995
75.188.35.168:443
95.77.223.148:443
105.198.236.99:443
110.174.64.179:995
47.40.196.233:2222
201.93.111.2:995
187.56.71.109:995
187.101.25.96:32100
174.54.193.186:443
86.8.177.143:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
72.252.201.69:443
68.117.229.117:443
167.248.117.81:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
167.248.99.149:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
69.30.186.190:443
72.196.22.184:443
167.248.23.224:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.75.181:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
90.197.155.33:443
197.90.137.161:61201
70.37.217.196:443
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
2.99.100.134:2222
217.17.56.163:443
39.52.236.68:995
71.190.231.182:443
62.23.194.38:443
62.23.194.41:995
173.25.166.81:443
199.27.127.129:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
5.238.148.193:61202
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Cwuuh = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Nbgnig = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 1336 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1684 schtasks.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\b4e63eb5 = 00bd566769652547fa24d9ec7d89117b04f46980d82184cf86d9f96668658b5dfd6ed78f9a0e4336dc86db72be58198aff65cb9278e7701458329c04 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\8338ce87 = 7e79aef14b2901d54b3f0166ad949e5b714b1ab37bca0640d3ebb0cfd0368fdf31271902b40995505b79f035706639b5a64877ae21183cd68c94db5bcc85f5807e33427df33669c1e31a70c5ad07da365c3e94 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\39c5899e = 2489dabd861ea6fff094b503a8a38482bb8a91733575721f8cb787fee3ea5de420de61c7dd0f5b15f2fb67fddaed3f167cf885a8268f3f07ae0f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\b4e63eb5 = 00bd4167696510edc955a7b50e981c8df7f26e8b858238950e903762c33f89f1590c923480dc1d461a3d6033cffd9824d97d43441d097d1667f7a10a9960a0bb6f911a475618531f16b52984b4e4c555d2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\8179eefb = 60b14250afa7f6a9407724ff4aa4cee9de3cf7aa417ed5b8c4bb3bedc4f6efb31838cf34a7c02dc3b385a46c360439266ec995eb2e72c4471886dd9e58e43afe12ec05818a4dd5b29cc34f4e8bdd5fd61d1b48e11af9732c9b7eb858ae907ab06703d54801fbe27e13006bc4f61aecb96ea4d69ec1f0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\3b84a9e2 = 3dfefd27093c613b9718c31577d9de0299643709d8685a8383ebb5573d24451dd3946f286655ffdc8398475b07c0d03c6fcd1b5104f5976cae50d3cc2c1fc8afac71941c9f45d2300f520bcc63a8ea56475702aea440531e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\468ce668 = 4ea2631f106a93d1f422cc2b634090a69d2c7e969fbf34361077208067a831c00e8dc720 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\fe30810d = 3b7f5496cd5faaef1ada507d04cec2b4b622b8466b85ad65b834d091d1755ac589386e1f158e036eb90835f99a11c0a36c6aac145e097d4cbd4bedbf06fec2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Rpayhkyhnbruap\cbaf5143 = 24a0e19771e3e475f69b6444bcfef67d3498c7e3c512a57ba576 explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 32 rundll32.exe 32 rundll32.exe 1336 regsvr32.exe 1336 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 32 rundll32.exe 1336 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4900 wrote to memory of 32 4900 rundll32.exe 88 PID 4900 wrote to memory of 32 4900 rundll32.exe 88 PID 4900 wrote to memory of 32 4900 rundll32.exe 88 PID 32 wrote to memory of 4168 32 rundll32.exe 94 PID 32 wrote to memory of 4168 32 rundll32.exe 94 PID 32 wrote to memory of 4168 32 rundll32.exe 94 PID 32 wrote to memory of 4168 32 rundll32.exe 94 PID 32 wrote to memory of 4168 32 rundll32.exe 94 PID 4168 wrote to memory of 1684 4168 explorer.exe 95 PID 4168 wrote to memory of 1684 4168 explorer.exe 95 PID 4168 wrote to memory of 1684 4168 explorer.exe 95 PID 2416 wrote to memory of 1336 2416 regsvr32.exe 102 PID 2416 wrote to memory of 1336 2416 regsvr32.exe 102 PID 2416 wrote to memory of 1336 2416 regsvr32.exe 102 PID 1336 wrote to memory of 1416 1336 regsvr32.exe 103 PID 1336 wrote to memory of 1416 1336 regsvr32.exe 103 PID 1336 wrote to memory of 1416 1336 regsvr32.exe 103 PID 1336 wrote to memory of 1416 1336 regsvr32.exe 103 PID 1336 wrote to memory of 1416 1336 regsvr32.exe 103 PID 1416 wrote to memory of 4260 1416 explorer.exe 104 PID 1416 wrote to memory of 4260 1416 explorer.exe 104 PID 1416 wrote to memory of 3212 1416 explorer.exe 106 PID 1416 wrote to memory of 3212 1416 explorer.exe 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18560d526a5134a7674aeacb02c1ca7f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18560d526a5134a7674aeacb02c1ca7f.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn woucbqcy /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\18560d526a5134a7674aeacb02c1ca7f.dll\"" /SC ONCE /Z /ST 16:07 /ET 16:194⤵
- Creates scheduled task(s)
PID:1684
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\18560d526a5134a7674aeacb02c1ca7f.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\18560d526a5134a7674aeacb02c1ca7f.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Cwuuh" /d "0"4⤵
- Windows security bypass
PID:4260
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Nbgnig" /d "0"4⤵
- Windows security bypass
PID:3212
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD518560d526a5134a7674aeacb02c1ca7f
SHA1f150b2068c282d8fafd02b15fec005fa89cd28b3
SHA2568f604242dfb785e324e8207b35f8ce7261436f79cd8b19659a2f194333f31d6f
SHA512319cbd6f8f2d75d87a7b2b801f1debe559b7d62b713072e454a1b59ee6f5afa041c3ee45c23bfc0b54f205b76f23878f5b5c8b99a193c76464e383c7120ee834