Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 16:44
Static task
static1
Behavioral task
behavioral1
Sample
60a68dfff01d04bd02058f23ca26aa1e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60a68dfff01d04bd02058f23ca26aa1e.dll
Resource
win10v2004-20231215-en
General
-
Target
60a68dfff01d04bd02058f23ca26aa1e.dll
-
Size
1.0MB
-
MD5
60a68dfff01d04bd02058f23ca26aa1e
-
SHA1
f5aba7d1633d8eb6ba7574f7ac4beab140aaeb42
-
SHA256
c05fc0120c066ef16e6ae53400d3d7965f83114635ef41900246d021ed58019e
-
SHA512
0b4ab9029da737e6464de6603849323a63c35e5c2a4396fb535ccfb110b9e588ab3efa0ea04374cda32f4147fd87b833b27c442d338a60e478ab2f3314b53428
-
SSDEEP
24576:f+N4RsxeZIlcgFagUOqtQ1e78l1T9N36OfMMElHNGlpJMFymEYe/uAg9JXkQKLKr:fhIOgFa41l1T9N36OUMzlpJMFymEYe/S
Malware Config
Extracted
qakbot
402.363
tr
1633334141
75.75.179.226:443
185.250.148.74:443
122.11.220.212:2222
120.150.218.241:995
103.148.120.144:443
140.82.49.12:443
40.131.140.155:995
206.47.134.234:2222
73.230.205.91:443
190.198.206.189:2222
103.157.122.198:995
81.250.153.227:2222
167.248.100.227:443
96.57.188.174:2078
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
136.232.34.70:443
68.186.192.69:443
167.248.111.245:443
81.241.252.59:2078
94.200.181.154:443
47.22.148.6:443
208.89.170.179:443
73.77.87.137:443
96.46.103.226:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
109.12.111.14:443
216.201.162.158:443
73.25.124.140:2222
181.118.183.94:443
174.54.58.170:443
24.152.219.253:995
124.123.42.115:2222
76.25.142.196:443
45.46.53.140:2222
37.210.152.224:995
173.21.10.71:2222
68.13.157.69:0
75.89.195.186:995
67.165.206.193:993
71.74.12.34:443
24.119.214.7:443
75.66.88.33:443
73.151.236.31:443
89.101.97.139:443
159.2.51.200:2222
78.191.36.142:995
75.188.35.168:443
95.77.223.148:443
105.198.236.99:443
110.174.64.179:995
47.40.196.233:2222
201.93.111.2:995
187.56.71.109:995
187.101.25.96:32100
174.54.193.186:443
86.8.177.143:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
72.252.201.69:443
68.117.229.117:443
167.248.117.81:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
167.248.99.149:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
69.30.186.190:443
72.196.22.184:443
167.248.23.224:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.75.181:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
90.197.155.33:443
197.90.137.161:61201
70.37.217.196:443
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
2.99.100.134:2222
217.17.56.163:443
39.52.236.68:995
71.190.231.182:443
62.23.194.38:443
62.23.194.41:995
173.25.166.81:443
199.27.127.129:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
5.238.148.193:61202
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Gdramctbif = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Exviqeiryrk = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 2376 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\55652727 = 7516232facdc0652adeba0e9c29fb2821bb0825ba15e4ecc7a8c331748c68d47664c2b8f9cb4cdc51801bfc56f2cdf618928f8caf1152dca8a64567a561c5528eda568f7359e3bf2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\a70ffffa = ecb255347143f8a5d519c5994d42a92e4b3a7e097191022473ea04ed20f8d034e97fd961844a7c5083c4711af5143e40d44f8096500c8578acc7acf672d492ee0323a3928e95e7aaf2c12625a8e58079b43d5c9e58487e0a953bafdc4cccc1d771 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\55652727 = 7516342facdc33c8764e9576f3b88db88a1815bbb384e61343a39d9e634012cc83aad9d4416e822ecd7d25f67f916cc1662d6374336a35af8997a25d6bda0f656b39421c517218bbee3db15e03d27975781960bb6eaf91beb2a2465b39 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Dnenvylglcbyi explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\60faf769 = a040ac57439a393251f58e0b6368fac7ff8c2c3858401b4779286fd32a23e4a154e8bbf203eb725da37aa95533db35172767e241b1ad9a1ffc2f46bfb091e2898514e646db6c931f8c07000bde1db304cdd4f0d04226794d7b88e3a4f2d5cf07771b5bb12b732c26a0b06062e616ac8dce4d3eee8ba06b8bb7bceae99ed8710277215871ba81264ca3e472b0de88f9c3ca098458e46fe8349b90443471b849ca8aa3deaeb126473c4f1bdb03c738d44e4b924519fc1e29be9c96e4cb8f41e78b367a783aa16fc769daf6e9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\62bbd715 = 099a0913dc8d52fb2985873881e9af37ed886218d6168250804af259d00fba36da5d4ce000512eead2649bd522e7303c692bb9a07ee4a86931c268c708e5595ad6504d020a7c1bf8f3b32eb960acac85a1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\da07b070 = c17fcb84f35d827057c7f87cfda2c1857cbb45951258fd1b35c55a4755b98434033bba19d7a655690d8d1c906680ab514214d3f76f7379ec6b6efcaa4e6e669a6eaa2dde86008e8ebda84cb514f5644dd6216fae8e606ceb4f7382 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\1fb3989f = 08bfe864f002d07a9be63f117ef20a63fc7e6a87198d209b4a036c2f48 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\d846900c = 746fbe22ee34eced56fd07717af1a7e52d4b37d359f79b22d7572aecc7 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Dnenvylglcbyi\2a2c48d1 = 3d8ddca9c61690306a0e14d7151419be71f57bb908ed4db7d7c3b6 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 2204 rundll32.exe 2376 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 2204 rundll32.exe 2376 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 688 wrote to memory of 2204 688 rundll32.exe 28 PID 688 wrote to memory of 2204 688 rundll32.exe 28 PID 688 wrote to memory of 2204 688 rundll32.exe 28 PID 688 wrote to memory of 2204 688 rundll32.exe 28 PID 688 wrote to memory of 2204 688 rundll32.exe 28 PID 688 wrote to memory of 2204 688 rundll32.exe 28 PID 688 wrote to memory of 2204 688 rundll32.exe 28 PID 2204 wrote to memory of 2128 2204 rundll32.exe 31 PID 2204 wrote to memory of 2128 2204 rundll32.exe 31 PID 2204 wrote to memory of 2128 2204 rundll32.exe 31 PID 2204 wrote to memory of 2128 2204 rundll32.exe 31 PID 2204 wrote to memory of 2128 2204 rundll32.exe 31 PID 2204 wrote to memory of 2128 2204 rundll32.exe 31 PID 2128 wrote to memory of 2932 2128 explorer.exe 32 PID 2128 wrote to memory of 2932 2128 explorer.exe 32 PID 2128 wrote to memory of 2932 2128 explorer.exe 32 PID 2128 wrote to memory of 2932 2128 explorer.exe 32 PID 2824 wrote to memory of 1888 2824 taskeng.exe 35 PID 2824 wrote to memory of 1888 2824 taskeng.exe 35 PID 2824 wrote to memory of 1888 2824 taskeng.exe 35 PID 2824 wrote to memory of 1888 2824 taskeng.exe 35 PID 2824 wrote to memory of 1888 2824 taskeng.exe 35 PID 1888 wrote to memory of 2376 1888 regsvr32.exe 36 PID 1888 wrote to memory of 2376 1888 regsvr32.exe 36 PID 1888 wrote to memory of 2376 1888 regsvr32.exe 36 PID 1888 wrote to memory of 2376 1888 regsvr32.exe 36 PID 1888 wrote to memory of 2376 1888 regsvr32.exe 36 PID 1888 wrote to memory of 2376 1888 regsvr32.exe 36 PID 1888 wrote to memory of 2376 1888 regsvr32.exe 36 PID 2376 wrote to memory of 1640 2376 regsvr32.exe 37 PID 2376 wrote to memory of 1640 2376 regsvr32.exe 37 PID 2376 wrote to memory of 1640 2376 regsvr32.exe 37 PID 2376 wrote to memory of 1640 2376 regsvr32.exe 37 PID 2376 wrote to memory of 1640 2376 regsvr32.exe 37 PID 2376 wrote to memory of 1640 2376 regsvr32.exe 37 PID 1640 wrote to memory of 2660 1640 explorer.exe 38 PID 1640 wrote to memory of 2660 1640 explorer.exe 38 PID 1640 wrote to memory of 2660 1640 explorer.exe 38 PID 1640 wrote to memory of 2660 1640 explorer.exe 38 PID 1640 wrote to memory of 1876 1640 explorer.exe 40 PID 1640 wrote to memory of 1876 1640 explorer.exe 40 PID 1640 wrote to memory of 1876 1640 explorer.exe 40 PID 1640 wrote to memory of 1876 1640 explorer.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60a68dfff01d04bd02058f23ca26aa1e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\60a68dfff01d04bd02058f23ca26aa1e.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn iixkrjfpj /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\60a68dfff01d04bd02058f23ca26aa1e.dll\"" /SC ONCE /Z /ST 18:16 /ET 18:284⤵
- Creates scheduled task(s)
PID:2932
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A6B1229B-D13F-4BE6-A089-8EE756DB50B4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\60a68dfff01d04bd02058f23ca26aa1e.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\60a68dfff01d04bd02058f23ca26aa1e.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Gdramctbif" /d "0"5⤵
- Windows security bypass
PID:2660
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Exviqeiryrk" /d "0"5⤵
- Windows security bypass
PID:1876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD560a68dfff01d04bd02058f23ca26aa1e
SHA1f5aba7d1633d8eb6ba7574f7ac4beab140aaeb42
SHA256c05fc0120c066ef16e6ae53400d3d7965f83114635ef41900246d021ed58019e
SHA5120b4ab9029da737e6464de6603849323a63c35e5c2a4396fb535ccfb110b9e588ab3efa0ea04374cda32f4147fd87b833b27c442d338a60e478ab2f3314b53428