Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 17:43
Static task
static1
Behavioral task
behavioral1
Sample
6d39550a26cc664be68c89f6317a3f72.dll
Resource
win7-20231215-en
General
-
Target
6d39550a26cc664be68c89f6317a3f72.dll
-
Size
1.0MB
-
MD5
6d39550a26cc664be68c89f6317a3f72
-
SHA1
e20bf2724a4b2d514f33a52605def521c912c8a1
-
SHA256
4b206bf8f7c890059e8a4b112a86d066005318b8bc204be353d737743c51e893
-
SHA512
5046f204888c426c2febc594e5a9c156c5c923241dc0419dbeaa7b7a051120bd1497441a2a9f465890a58808e5cf4293251855c2abf8c1d56cdb05d8c6af86e6
-
SSDEEP
24576:T+N4RsxwZIlcgFagUOqtQ1e78l1T9N36OfMMElHNGlpJMFymEYe/uAg9JXkQKLK7:TzIOgFa41l1T9N36OUMzlpJMFymEYe/6
Malware Config
Extracted
qakbot
402.363
tr
1633334141
75.75.179.226:443
185.250.148.74:443
122.11.220.212:2222
120.150.218.241:995
103.148.120.144:443
140.82.49.12:443
40.131.140.155:995
206.47.134.234:2222
73.230.205.91:443
190.198.206.189:2222
103.157.122.198:995
81.250.153.227:2222
167.248.100.227:443
96.57.188.174:2078
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
136.232.34.70:443
68.186.192.69:443
167.248.111.245:443
81.241.252.59:2078
94.200.181.154:443
47.22.148.6:443
208.89.170.179:443
73.77.87.137:443
96.46.103.226:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
109.12.111.14:443
216.201.162.158:443
73.25.124.140:2222
181.118.183.94:443
174.54.58.170:443
24.152.219.253:995
124.123.42.115:2222
76.25.142.196:443
45.46.53.140:2222
37.210.152.224:995
173.21.10.71:2222
68.13.157.69:0
75.89.195.186:995
67.165.206.193:993
71.74.12.34:443
24.119.214.7:443
75.66.88.33:443
73.151.236.31:443
89.101.97.139:443
159.2.51.200:2222
78.191.36.142:995
75.188.35.168:443
95.77.223.148:443
105.198.236.99:443
110.174.64.179:995
47.40.196.233:2222
201.93.111.2:995
187.56.71.109:995
187.101.25.96:32100
174.54.193.186:443
86.8.177.143:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
72.252.201.69:443
68.117.229.117:443
167.248.117.81:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
167.248.99.149:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
69.30.186.190:443
72.196.22.184:443
167.248.23.224:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.75.181:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
90.197.155.33:443
197.90.137.161:61201
70.37.217.196:443
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
2.99.100.134:2222
217.17.56.163:443
39.52.236.68:995
71.190.231.182:443
62.23.194.38:443
62.23.194.41:995
173.25.166.81:443
199.27.127.129:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
5.238.148.193:61202
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Dbexiavu = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Ymaxp = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 4888 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\62f0fb7d = c9a5a4fe14e4f222de5225008c4ab361d7a9c819ac97912e716418e2f5bece6fd76277c98a05df7cc1d08da7b5b24e84900db49b6319ac4ab4ab6d09adaa7225bc32eb9204d0f0894b5e9259eee1b2dc9aa20d6ccc09927cf86a00db2206b207cfbc0d52c96a15923e9f456e0dfb64688407b0c8c1a6219080313009be087e7772fd1be05f05b6e505967d5d13ab161ce519311a44d1fd56c385a5a3c08fed886fa55ba4ad9a02166dc0a3b993410e7074 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\a505f3ee = 3cda0a63b03daa9067036fe97dd20e3142a39846fbea2ae89b2f4058d2a8e10e276cb48a1382 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\1db9948b = 77641f4d4f04639f09711393953de2e4c8873bcf648d627b1011f43c4e94 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\576f2b33 = bc742ef01f8355a7918224c3ea0eb9f99cce682c8e371c6dfe2403400d2ac1cef38de2a88baa28a5b037d7525036d6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\576f2b33 = bc7439f01f83605bf5bc3f3bca1c8ab13ad5409a552fc462cdad explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\60b1db01 = 2901e9e8a7d4f135aca2a183e7935d566ca84aaca17ff3e88aa77ba83016f9b847f86d05435e68ad881c96ccedb629754f70a145c2dbdbd59ef8c08346f156997becaa5b010a908893ec0613659ffb3b2df8a27c124bf6a8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\d80dbc64 = c36fab93f73f02d73ea1fa6799f8a1551545e99f36a86ac94de7fad25c46a3f7f8597bdf4c233895273d755c8cb61e20b7c719632d87818fe3e4ac6155b6e8226f35d80c57420ca90124af86e2787967ba59064b5d7c5035c48b86a8a9 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\da4c9c18 = 2b3c953194ebe77d19b3a47b23fa791747fa8a8d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ydfmvduor\282644c5 = b9f198c60cae98c0d0b28888377670bf9911571bc74f26533fc1c53e741ac08a10bd12b2c8af3ea8de020b77023bb91b2fb651db7081c36b8ff3224f explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 4368 rundll32.exe 4368 rundll32.exe 4888 regsvr32.exe 4888 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 4368 rundll32.exe 4888 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 528 wrote to memory of 4368 528 rundll32.exe 87 PID 528 wrote to memory of 4368 528 rundll32.exe 87 PID 528 wrote to memory of 4368 528 rundll32.exe 87 PID 4368 wrote to memory of 4740 4368 rundll32.exe 93 PID 4368 wrote to memory of 4740 4368 rundll32.exe 93 PID 4368 wrote to memory of 4740 4368 rundll32.exe 93 PID 4368 wrote to memory of 4740 4368 rundll32.exe 93 PID 4368 wrote to memory of 4740 4368 rundll32.exe 93 PID 4740 wrote to memory of 2612 4740 explorer.exe 94 PID 4740 wrote to memory of 2612 4740 explorer.exe 94 PID 4740 wrote to memory of 2612 4740 explorer.exe 94 PID 2784 wrote to memory of 4888 2784 regsvr32.exe 101 PID 2784 wrote to memory of 4888 2784 regsvr32.exe 101 PID 2784 wrote to memory of 4888 2784 regsvr32.exe 101 PID 4888 wrote to memory of 3240 4888 regsvr32.exe 102 PID 4888 wrote to memory of 3240 4888 regsvr32.exe 102 PID 4888 wrote to memory of 3240 4888 regsvr32.exe 102 PID 4888 wrote to memory of 3240 4888 regsvr32.exe 102 PID 4888 wrote to memory of 3240 4888 regsvr32.exe 102 PID 3240 wrote to memory of 3564 3240 explorer.exe 103 PID 3240 wrote to memory of 3564 3240 explorer.exe 103 PID 3240 wrote to memory of 4668 3240 explorer.exe 106 PID 3240 wrote to memory of 4668 3240 explorer.exe 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ckrgdqpvs /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll\"" /SC ONCE /Z /ST 18:55 /ET 19:074⤵
- Creates scheduled task(s)
PID:2612
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\6d39550a26cc664be68c89f6317a3f72.dll"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Dbexiavu" /d "0"4⤵
- Windows security bypass
PID:3564
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ymaxp" /d "0"4⤵
- Windows security bypass
PID:4668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD534ea7c13d176110857a70c0611afa00d
SHA12ac407cbc83f72fff56877e4e3e9837bcde3ea51
SHA256a05d430d5ad79f13213d3666664aad683a0a7015a2115a246344cf1ab691a955
SHA5120c9da299d03a8f55892a59432542084646bdeb23b382f1bf59c0fb21871fe1a8105f5aa20f1818ae41bacef721a197751455c88da54081a0aeef3a838c7643af
-
Filesize
115KB
MD529b29548c868e4ba8650339aef3f64bc
SHA1c5d88cfdd82b1e88437812eef1e5efca0b9fa309
SHA256082b35b1702294767c0dfc9d566d69ddf098e2be6dcddc31b9691dc886e000ca
SHA51257fbde7514f66f55f8a98fc3808d468d0433bc2d4efd280fa254f25b01d517f648b4d64f6f37f8bfd2b03cb67e7e7b00f825e74368be893e90ebe6ef255af5ab