Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 20:07
Static task
static1
Behavioral task
behavioral1
Sample
8de512bd768a612f1f91f55718e0d53d.dll
Resource
win7-20231215-en
General
-
Target
8de512bd768a612f1f91f55718e0d53d.dll
-
Size
750KB
-
MD5
8de512bd768a612f1f91f55718e0d53d
-
SHA1
d2f0b77d4d5ffa23a1e3cd26d43d01c3bfa9dd09
-
SHA256
e64e7761e85c14928ae398e2b27ec8db0ebcf8f8a6b5a48dcf46f42393121097
-
SHA512
dba9f21ae79ddca811bfeecb5ca3181de8f4b381f9ae13e88fa39c883a1557c221d79825d7f9003b8c26c1ed86951a9907b2bbb4d67e4293dce47c35a80a96ed
-
SSDEEP
12288:8V75XRqXnVyGXpI7fFHpsqJtjA42je3kyS6wEB35cyCH:fXnVyy6WIkBy3kySqBpFA
Malware Config
Extracted
qakbot
402.363
obama105
1632821932
120.151.47.189:443
41.228.22.180:443
39.52.241.3:995
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
196.217.156.63:995
120.150.218.241:995
95.77.223.148:443
185.250.148.74:443
181.118.183.94:443
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
76.25.142.196:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Isjku = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Csewsihunimv = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1720 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\15636818 = 637fc982bdc9c40874bed24c60394b82dc21731e87aa11fd7dad8d2544642623404222b1b06e00c80f4fd2cce1f1a174abfc9cdd854bd425b5e6ef87 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\d296608b = 19428126fafea66c62c12b3428bac7fa16 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Coeznbiobo explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\686b2792 = 8027c7147198455ff72546a9f07980277b221bfdf9b5260d676921a45b72189f9eb1c7993ca6abc17536c7b8bc9ed18dc734f3eaedc6c6f42da4cf16e35bbe40227cbb9b4bbbc132fc85265f7296bbd87f858dace501f36bf8d6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\d0d740f7 = b47a75d188de4c366129ff697ba90aefee75633bfbdf9b2ba43b653b408b34733c3bf256e15bae4e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\addf0f7d = 5620bdfd50bec3c57057de2692c3fdbb9e996acfd650d6e27e21b488455f70693da0f641c6afbc4ea677fa25d49e1fb03236e3989b9bc919d50d6480edf527affc87fd91a686500684 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\5fb5d7a0 = b5ce5e87f0b6fd6afcb89a6700a51a9c201874ac478d7a40e8b032db6d67717328d368676ea6215f6d8929ae91235980 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\6a2a07ee = de80a51bd4d12443d6f0e17559e10335f505c29e40fd13d4ea1c50c80f4f04179da19f1fadc7a7cff135625aa4fb3ec615f0b78eb2f72094443d9b933b5aca0e8bfea7d64eaf9846c97341bc196b9e3c838ec92c260066022f7663568b6dda1b7a88b9f72ba99433564c1666eade5fcb20c2d67351c8ea2a9aa30b85f304329f6411482f8518f90be2796729793e8105b1a6da5b667a90b9fee2c8d69e9e1347ebee2c71c2430e3df59cc83601a372ddbc6c87b9c49f6399ee5bb482ff13959e7eb2 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\20fcb856 = 9301fec8f6653642274fea07035666001fe3861eb0a27e9907c9bd1a97ba5f830e1383b556f45c50c0fac7daf678b5d7c255e6509f9339a1db8aa9af79792862ccd792db3ef2ed951b6f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Coeznbiobo\5fb5d7a0 = b5ce4987f0b6c89a584ac8513490b5a3dd15cea4f99c366b2ddde9bb9942f4ab44447e7392db416eba7fe50d628a7f0650613a3721f4ff775343c68890ffed5db3b7cf5f26 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 2088 rundll32.exe 1720 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid process 2088 rundll32.exe 1720 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1156 wrote to memory of 2088 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 2088 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 2088 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 2088 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 2088 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 2088 1156 rundll32.exe rundll32.exe PID 1156 wrote to memory of 2088 1156 rundll32.exe rundll32.exe PID 2088 wrote to memory of 2820 2088 rundll32.exe explorer.exe PID 2088 wrote to memory of 2820 2088 rundll32.exe explorer.exe PID 2088 wrote to memory of 2820 2088 rundll32.exe explorer.exe PID 2088 wrote to memory of 2820 2088 rundll32.exe explorer.exe PID 2088 wrote to memory of 2820 2088 rundll32.exe explorer.exe PID 2088 wrote to memory of 2820 2088 rundll32.exe explorer.exe PID 2820 wrote to memory of 2140 2820 explorer.exe schtasks.exe PID 2820 wrote to memory of 2140 2820 explorer.exe schtasks.exe PID 2820 wrote to memory of 2140 2820 explorer.exe schtasks.exe PID 2820 wrote to memory of 2140 2820 explorer.exe schtasks.exe PID 1524 wrote to memory of 1928 1524 taskeng.exe regsvr32.exe PID 1524 wrote to memory of 1928 1524 taskeng.exe regsvr32.exe PID 1524 wrote to memory of 1928 1524 taskeng.exe regsvr32.exe PID 1524 wrote to memory of 1928 1524 taskeng.exe regsvr32.exe PID 1524 wrote to memory of 1928 1524 taskeng.exe regsvr32.exe PID 1928 wrote to memory of 1720 1928 regsvr32.exe regsvr32.exe PID 1928 wrote to memory of 1720 1928 regsvr32.exe regsvr32.exe PID 1928 wrote to memory of 1720 1928 regsvr32.exe regsvr32.exe PID 1928 wrote to memory of 1720 1928 regsvr32.exe regsvr32.exe PID 1928 wrote to memory of 1720 1928 regsvr32.exe regsvr32.exe PID 1928 wrote to memory of 1720 1928 regsvr32.exe regsvr32.exe PID 1928 wrote to memory of 1720 1928 regsvr32.exe regsvr32.exe PID 1720 wrote to memory of 868 1720 regsvr32.exe explorer.exe PID 1720 wrote to memory of 868 1720 regsvr32.exe explorer.exe PID 1720 wrote to memory of 868 1720 regsvr32.exe explorer.exe PID 1720 wrote to memory of 868 1720 regsvr32.exe explorer.exe PID 1720 wrote to memory of 868 1720 regsvr32.exe explorer.exe PID 1720 wrote to memory of 868 1720 regsvr32.exe explorer.exe PID 868 wrote to memory of 1988 868 explorer.exe reg.exe PID 868 wrote to memory of 1988 868 explorer.exe reg.exe PID 868 wrote to memory of 1988 868 explorer.exe reg.exe PID 868 wrote to memory of 1988 868 explorer.exe reg.exe PID 868 wrote to memory of 2052 868 explorer.exe reg.exe PID 868 wrote to memory of 2052 868 explorer.exe reg.exe PID 868 wrote to memory of 2052 868 explorer.exe reg.exe PID 868 wrote to memory of 2052 868 explorer.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8de512bd768a612f1f91f55718e0d53d.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8de512bd768a612f1f91f55718e0d53d.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn sxpcerqsaw /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\8de512bd768a612f1f91f55718e0d53d.dll\"" /SC ONCE /Z /ST 01:23 /ET 01:354⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {F0A1EB7E-9853-4375-A1D6-B6DAA558E632} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\8de512bd768a612f1f91f55718e0d53d.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\8de512bd768a612f1f91f55718e0d53d.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Csewsihunimv" /d "0"5⤵
- Windows security bypass
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Isjku" /d "0"5⤵
- Windows security bypass
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8de512bd768a612f1f91f55718e0d53d.dllFilesize
750KB
MD58de512bd768a612f1f91f55718e0d53d
SHA1d2f0b77d4d5ffa23a1e3cd26d43d01c3bfa9dd09
SHA256e64e7761e85c14928ae398e2b27ec8db0ebcf8f8a6b5a48dcf46f42393121097
SHA512dba9f21ae79ddca811bfeecb5ca3181de8f4b381f9ae13e88fa39c883a1557c221d79825d7f9003b8c26c1ed86951a9907b2bbb4d67e4293dce47c35a80a96ed
-
memory/868-29-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/868-26-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/868-31-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/868-30-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1720-21-0x0000000074590000-0x0000000074662000-memory.dmpFilesize
840KB
-
memory/1720-22-0x0000000074590000-0x0000000074662000-memory.dmpFilesize
840KB
-
memory/1720-27-0x0000000074590000-0x0000000074662000-memory.dmpFilesize
840KB
-
memory/2088-5-0x0000000074FE0000-0x00000000750B2000-memory.dmpFilesize
840KB
-
memory/2088-9-0x0000000074FE0000-0x00000000750B2000-memory.dmpFilesize
840KB
-
memory/2088-0-0x0000000074FE0000-0x00000000750B2000-memory.dmpFilesize
840KB
-
memory/2088-4-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/2088-2-0x0000000074FE0000-0x00000000750B2000-memory.dmpFilesize
840KB
-
memory/2820-6-0x00000000000F0000-0x00000000000F2000-memory.dmpFilesize
8KB
-
memory/2820-16-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/2820-14-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/2820-13-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/2820-12-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/2820-8-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB