Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 17:43
Static task
static1
Behavioral task
behavioral1
Sample
6d39550a26cc664be68c89f6317a3f72.dll
Resource
win7-20231215-en
General
-
Target
6d39550a26cc664be68c89f6317a3f72.dll
-
Size
1.0MB
-
MD5
6d39550a26cc664be68c89f6317a3f72
-
SHA1
e20bf2724a4b2d514f33a52605def521c912c8a1
-
SHA256
4b206bf8f7c890059e8a4b112a86d066005318b8bc204be353d737743c51e893
-
SHA512
5046f204888c426c2febc594e5a9c156c5c923241dc0419dbeaa7b7a051120bd1497441a2a9f465890a58808e5cf4293251855c2abf8c1d56cdb05d8c6af86e6
-
SSDEEP
24576:T+N4RsxwZIlcgFagUOqtQ1e78l1T9N36OfMMElHNGlpJMFymEYe/uAg9JXkQKLK7:TzIOgFa41l1T9N36OUMzlpJMFymEYe/6
Malware Config
Extracted
qakbot
402.363
tr
1633334141
75.75.179.226:443
185.250.148.74:443
122.11.220.212:2222
120.150.218.241:995
103.148.120.144:443
140.82.49.12:443
40.131.140.155:995
206.47.134.234:2222
73.230.205.91:443
190.198.206.189:2222
103.157.122.198:995
81.250.153.227:2222
167.248.100.227:443
96.57.188.174:2078
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
136.232.34.70:443
68.186.192.69:443
167.248.111.245:443
81.241.252.59:2078
94.200.181.154:443
47.22.148.6:443
208.89.170.179:443
73.77.87.137:443
96.46.103.226:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
109.12.111.14:443
216.201.162.158:443
73.25.124.140:2222
181.118.183.94:443
174.54.58.170:443
24.152.219.253:995
124.123.42.115:2222
76.25.142.196:443
45.46.53.140:2222
37.210.152.224:995
173.21.10.71:2222
68.13.157.69:0
75.89.195.186:995
67.165.206.193:993
71.74.12.34:443
24.119.214.7:443
75.66.88.33:443
73.151.236.31:443
89.101.97.139:443
159.2.51.200:2222
78.191.36.142:995
75.188.35.168:443
95.77.223.148:443
105.198.236.99:443
110.174.64.179:995
47.40.196.233:2222
201.93.111.2:995
187.56.71.109:995
187.101.25.96:32100
174.54.193.186:443
86.8.177.143:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
72.252.201.69:443
68.117.229.117:443
167.248.117.81:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
167.248.99.149:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
69.30.186.190:443
72.196.22.184:443
167.248.23.224:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.75.181:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
90.197.155.33:443
197.90.137.161:61201
70.37.217.196:443
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
2.99.100.134:2222
217.17.56.163:443
39.52.236.68:995
71.190.231.182:443
62.23.194.38:443
62.23.194.41:995
173.25.166.81:443
199.27.127.129:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
5.238.148.193:61202
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Hhpyzohes = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Atohegxryg = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 1084 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\ebfea43f = 943a186fca43b1faa738ea517c5cc5ca4d664056e961393977b4d30cdfc00f92957298f8fd9230901562779e92e4a1a4b14b09053730957bad1f157faf7f4a04ea3afb4ebe8e8b90bb3d83ae03767e644d12595461f851aeca1f795a7c338cd4818f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\dc20540d = 23eb9ebad6b2b2d77c11ee41869cc3aa9130d5cbe5816219b566567516a4bdd2089643058fd6ad31d08b062579dd7791b5cdf1032a7e8d7845b40081ef87ea8b570e96374fcde3403444c8c4d600789b50268e238f3f8a209509b125da8863 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\649c3368 = c448eede3364e81079efbe4914ac2931234025d0ae1e461951369aa80b90cafd3ab1ac5fecf588c86b3647492351cfeed8a076c90a0f9c38 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\de617471 = 6b246554fbe1b47ab9a0697a238f6e1ad437b71c4c4a12adb56966aefaac65758a0fe370b835ce31c5c47eacdbf013d24f5c64e2c9e91f472f65fde13dd4ad1c843de96f395ead64ca07434328a221d6763276cd6baafdc7c07c9aedd36baec93114787383a664d0dc3b683168984a4eac5ac15857ad925582ac15fb8483f5f6d00c5e23c3d80a28ba6066c3db271370a2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\19947ce2 = fb541e04a2e58f654da88488b4dda173fbb4bfdf57e2b78c5560364eabfce2a77347aeff337aad9cdcec explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\a1281b87 = 2c71ad2200512d59decf9ebe4dd746657e56460ed87cac985f96574e49d6872af7cc45eae18330fe34d540087ba25a4504e17192fedd0134d6ddb9a8810051743f9f24271c68b073cfc79977d98d4b99ad047b099396001fab7091c5d251c9d0f35c09defd297c81e539d7 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\66dd1314 = 5293b14137daf72569e751560bfe810b0dda5c292aae928135e15f7065693b6685e50b9c786aee097cf0568759868c6ba271555c0447f24565c8e62671d4f3380cd6b1a62b736bfc65f0c1c242a9e37188890d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\94b7cbc9 = d6cecb64d83d10cf839a78e33d1439d71d2ac94e2573d396679965686b7d5fc92652e081914ebb1ef73772f438045a71d7d44868f4d538b61af1a315e67fdcc637fdc9254387467f59160f4d767c016c1ba1c11664aafac9ba37ad349bb97ddea8aec74cdf5451cc4c0339139720541a5172 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Extofuhjasx\ebfea43f = 943a0f6fca4384d9248bd71474636e666d951eadf8f587a8b3238c0aa42c23e59b74a7c58f7fc77f4eeb02396041fe7d69697b87e4fb32d1dcd8a5ae6d4670a544af137ab4294d3d8a28deb4700d8271d842fb10654e1f5f0655d677713c41a1ce1fa0f023356d3ab4fa97e64cd984326b5b0ab5018129 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3028 rundll32.exe 1084 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3028 rundll32.exe 1084 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3028 2300 rundll32.exe 28 PID 2300 wrote to memory of 3028 2300 rundll32.exe 28 PID 2300 wrote to memory of 3028 2300 rundll32.exe 28 PID 2300 wrote to memory of 3028 2300 rundll32.exe 28 PID 2300 wrote to memory of 3028 2300 rundll32.exe 28 PID 2300 wrote to memory of 3028 2300 rundll32.exe 28 PID 2300 wrote to memory of 3028 2300 rundll32.exe 28 PID 3028 wrote to memory of 2788 3028 rundll32.exe 29 PID 3028 wrote to memory of 2788 3028 rundll32.exe 29 PID 3028 wrote to memory of 2788 3028 rundll32.exe 29 PID 3028 wrote to memory of 2788 3028 rundll32.exe 29 PID 3028 wrote to memory of 2788 3028 rundll32.exe 29 PID 3028 wrote to memory of 2788 3028 rundll32.exe 29 PID 2788 wrote to memory of 2728 2788 explorer.exe 30 PID 2788 wrote to memory of 2728 2788 explorer.exe 30 PID 2788 wrote to memory of 2728 2788 explorer.exe 30 PID 2788 wrote to memory of 2728 2788 explorer.exe 30 PID 2204 wrote to memory of 1688 2204 taskeng.exe 35 PID 2204 wrote to memory of 1688 2204 taskeng.exe 35 PID 2204 wrote to memory of 1688 2204 taskeng.exe 35 PID 2204 wrote to memory of 1688 2204 taskeng.exe 35 PID 2204 wrote to memory of 1688 2204 taskeng.exe 35 PID 1688 wrote to memory of 1084 1688 regsvr32.exe 36 PID 1688 wrote to memory of 1084 1688 regsvr32.exe 36 PID 1688 wrote to memory of 1084 1688 regsvr32.exe 36 PID 1688 wrote to memory of 1084 1688 regsvr32.exe 36 PID 1688 wrote to memory of 1084 1688 regsvr32.exe 36 PID 1688 wrote to memory of 1084 1688 regsvr32.exe 36 PID 1688 wrote to memory of 1084 1688 regsvr32.exe 36 PID 1084 wrote to memory of 2916 1084 regsvr32.exe 37 PID 1084 wrote to memory of 2916 1084 regsvr32.exe 37 PID 1084 wrote to memory of 2916 1084 regsvr32.exe 37 PID 1084 wrote to memory of 2916 1084 regsvr32.exe 37 PID 1084 wrote to memory of 2916 1084 regsvr32.exe 37 PID 1084 wrote to memory of 2916 1084 regsvr32.exe 37 PID 2916 wrote to memory of 1484 2916 explorer.exe 38 PID 2916 wrote to memory of 1484 2916 explorer.exe 38 PID 2916 wrote to memory of 1484 2916 explorer.exe 38 PID 2916 wrote to memory of 1484 2916 explorer.exe 38 PID 2916 wrote to memory of 1580 2916 explorer.exe 41 PID 2916 wrote to memory of 1580 2916 explorer.exe 41 PID 2916 wrote to memory of 1580 2916 explorer.exe 41 PID 2916 wrote to memory of 1580 2916 explorer.exe 41
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ccwkjopvh /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll\"" /SC ONCE /Z /ST 18:55 /ET 19:074⤵
- Creates scheduled task(s)
PID:2728
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {EF4CF40C-8878-4C90-877F-97AED0A1FC69} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Hhpyzohes" /d "0"5⤵
- Windows security bypass
PID:1484
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Atohegxryg" /d "0"5⤵
- Windows security bypass
PID:1580
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD56d39550a26cc664be68c89f6317a3f72
SHA1e20bf2724a4b2d514f33a52605def521c912c8a1
SHA2564b206bf8f7c890059e8a4b112a86d066005318b8bc204be353d737743c51e893
SHA5125046f204888c426c2febc594e5a9c156c5c923241dc0419dbeaa7b7a051120bd1497441a2a9f465890a58808e5cf4293251855c2abf8c1d56cdb05d8c6af86e6