Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 20:33
Static task
static1
Behavioral task
behavioral1
Sample
9635dc7f7bc526b80b4fed8ddeeede37.dll
Resource
win7-20231215-en
General
-
Target
9635dc7f7bc526b80b4fed8ddeeede37.dll
-
Size
820KB
-
MD5
9635dc7f7bc526b80b4fed8ddeeede37
-
SHA1
062ed276f7d55a4cf137441a437f9507dd787310
-
SHA256
00eb9e819548a07373a5f3aacc0f449171dc3e520cef7086fd7f47d9ad3fc5f3
-
SHA512
4517989bf5181842ae028787affa19a3f1d021eb4c75aa61f23123eeaf4fbe51c79a7a94829f35824b91c543f5b138cb1f3ad043c9081c613592cd378237289c
-
SSDEEP
24576:OO6c3oCrVA7bEK7mJaW2eX8TvE81cIzsk6EzCUfk7Gu:UuVeEK7mmeX8TBcIzsk6hUf4J
Malware Config
Extracted
qakbot
402.363
obama112
1633682302
98.157.235.126:443
124.123.42.115:2222
185.250.148.74:443
73.77.87.137:443
188.50.169.158:443
216.201.162.158:443
174.54.193.186:443
27.223.92.142:995
220.255.25.28:2222
103.142.10.177:443
2.222.167.138:443
66.177.215.152:0
122.11.220.212:2222
85.109.229.54:995
140.82.49.12:443
199.27.127.129:443
209.50.20.255:443
73.230.205.91:443
200.232.214.222:995
81.241.252.59:2078
47.22.148.6:443
188.50.26.190:995
41.228.22.180:443
41.86.42.158:995
37.210.152.224:995
96.57.188.174:2078
41.86.42.158:443
94.200.181.154:443
182.176.180.73:443
63.143.92.99:995
69.30.186.190:443
167.248.117.81:443
73.52.50.32:443
72.173.78.211:443
73.77.87.137:995
136.232.34.70:443
40.131.140.155:995
181.118.183.94:443
93.48.58.123:2222
187.250.159.104:443
186.32.163.199:443
89.137.52.44:443
120.150.218.241:995
38.10.197.234:443
203.213.107.174:443
76.25.142.196:443
110.174.64.179:995
202.134.178.157:443
73.151.236.31:443
173.21.10.71:2222
45.46.53.140:2222
71.74.12.34:443
187.172.240.28:443
181.4.53.6:465
47.40.196.233:2222
189.136.217.97:995
67.165.206.193:993
68.204.7.158:443
86.8.177.143:443
201.93.111.2:995
89.101.97.139:443
109.12.111.14:443
24.55.112.61:443
66.103.170.104:2222
24.139.72.117:443
24.229.150.54:995
177.170.201.134:995
209.142.97.161:995
72.252.201.69:443
74.72.237.54:443
2.99.100.134:2222
81.250.153.227:2222
197.90.147.89:61201
66.177.215.152:50010
131.191.107.34:995
80.6.192.58:443
103.148.120.144:443
75.75.179.226:443
24.171.50.5:443
77.57.204.78:443
49.33.237.65:443
75.188.35.168:443
120.151.47.189:443
173.25.162.221:443
201.6.246.227:995
66.177.215.152:443
217.17.56.163:2222
202.165.32.158:2222
39.52.229.8:995
42.60.70.14:443
73.140.38.124:443
167.248.100.227:443
63.70.164.200:443
189.131.221.201:443
181.84.114.46:443
167.248.99.149:443
177.94.21.110:995
50.54.32.149:443
189.224.181.39:443
24.119.214.7:443
177.94.125.59:995
73.130.180.25:443
217.17.56.163:2078
75.66.88.33:443
206.47.134.234:2222
167.248.54.34:2222
181.4.53.6:443
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
68.186.192.69:443
162.210.220.137:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
159.2.51.200:2222
187.101.25.96:32100
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
97.98.130.50:443
196.117.226.146:995
191.191.38.8:443
188.210.210.122:443
96.46.103.109:2222
37.117.191.19:2222
24.32.174.175:443
76.84.225.21:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Ouauo = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Fugpuntcyk = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 2524 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Yyjvmfopaikq explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\32eda0b4 = 48c9d6e86cbc68988b037bf184df0f0d13ef0820fc5d79ee2f2cc8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\77270fa = aa02892854607765e5f802db3449c473113f27fb0a09518aa7fea786bfb0ab8546f2cdf6d0014b5e51c47944f8d7368bdf6dd748cc993ee4298325b0e35ae588fdd50f5afa95d10537161d55eeebae73ffc7fb49aa51a9116d7bfd2e6c912e9f21b5f5558129652a7bcd254d47624466079197f585c256b03395cad41bfafe46a87e913f5b03a789124441d0188a2a27205f6ed27fed0483e9e489aba62623c87c7222e9d6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\c0877869 = 4f3618d53c21605086a714a606b0584db06f277394d98b5af8b25df953e80925f8c255134a81f3cb097dd5a867759bba7bd4f7382c405d0781e88f3e8f629d4fd2fc0323e8eded119109991cc2d71f5401372207b424 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\783b1f0c = 719fd249d842e7145fcd5d26dc47c6ecef8512f7a8d6dc533786c71d4110311532f0a4655a27ca6c7f3bf56c0e2d001e11d6d2ddc8af9e50f573d547 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\bfce179f = 837bcafd03a6520e625c12ea0527ac3f702fe42b094b24d22866ac8c9fcfc4594f2a110c2be51c95fffff0cbd90de7fb2c6f3c950ce41345f6dcdaecc2bd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\5335086 = dcc0026e95189a78057398a8ba7556e744c54e23adc95f284cfa3ebc99c2dbb3b8c1ccd3d6590644f95d856eb467e7b28a0109fd69934e10ba8dcc9d449f96eba58b875a45f169a0c86e8c4371b44ee2b84082e8efd6614d8ee08cc68b92f0280b85973e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\bd8f37e3 = d48dd44e9cab25ed7e000d177ed9dc61a13b05a1e58e1e31606f0ec44002f494703efd0ee8cab10da3fbdec0e679c21107bc explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\4da4cf42 = f74abe6bdf5570239eb9d2764e8f1361017130bf2614403c545c6d2b14b904937aab666e7368ceb451124c75b13a0187e9bd3419dcc6322f13cb2691d2c9681c93301181120140182d78e2880f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Yyjvmfopaikq\32eda0b4 = 48c9c1e86cbc5d30f688a97387f64c7d51e9c20d639d79846ab98af02052c77c188d2c8d4a4fddc3fecf8c85af2af490 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 2064 rundll32.exe 2524 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 2064 rundll32.exe 2524 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 2220 wrote to memory of 2064 2220 rundll32.exe 28 PID 2220 wrote to memory of 2064 2220 rundll32.exe 28 PID 2220 wrote to memory of 2064 2220 rundll32.exe 28 PID 2220 wrote to memory of 2064 2220 rundll32.exe 28 PID 2220 wrote to memory of 2064 2220 rundll32.exe 28 PID 2220 wrote to memory of 2064 2220 rundll32.exe 28 PID 2220 wrote to memory of 2064 2220 rundll32.exe 28 PID 2064 wrote to memory of 2148 2064 rundll32.exe 29 PID 2064 wrote to memory of 2148 2064 rundll32.exe 29 PID 2064 wrote to memory of 2148 2064 rundll32.exe 29 PID 2064 wrote to memory of 2148 2064 rundll32.exe 29 PID 2064 wrote to memory of 2148 2064 rundll32.exe 29 PID 2064 wrote to memory of 2148 2064 rundll32.exe 29 PID 2148 wrote to memory of 2792 2148 explorer.exe 30 PID 2148 wrote to memory of 2792 2148 explorer.exe 30 PID 2148 wrote to memory of 2792 2148 explorer.exe 30 PID 2148 wrote to memory of 2792 2148 explorer.exe 30 PID 2940 wrote to memory of 844 2940 taskeng.exe 35 PID 2940 wrote to memory of 844 2940 taskeng.exe 35 PID 2940 wrote to memory of 844 2940 taskeng.exe 35 PID 2940 wrote to memory of 844 2940 taskeng.exe 35 PID 2940 wrote to memory of 844 2940 taskeng.exe 35 PID 844 wrote to memory of 2524 844 regsvr32.exe 36 PID 844 wrote to memory of 2524 844 regsvr32.exe 36 PID 844 wrote to memory of 2524 844 regsvr32.exe 36 PID 844 wrote to memory of 2524 844 regsvr32.exe 36 PID 844 wrote to memory of 2524 844 regsvr32.exe 36 PID 844 wrote to memory of 2524 844 regsvr32.exe 36 PID 844 wrote to memory of 2524 844 regsvr32.exe 36 PID 2524 wrote to memory of 1804 2524 regsvr32.exe 37 PID 2524 wrote to memory of 1804 2524 regsvr32.exe 37 PID 2524 wrote to memory of 1804 2524 regsvr32.exe 37 PID 2524 wrote to memory of 1804 2524 regsvr32.exe 37 PID 2524 wrote to memory of 1804 2524 regsvr32.exe 37 PID 2524 wrote to memory of 1804 2524 regsvr32.exe 37 PID 1804 wrote to memory of 564 1804 explorer.exe 38 PID 1804 wrote to memory of 564 1804 explorer.exe 38 PID 1804 wrote to memory of 564 1804 explorer.exe 38 PID 1804 wrote to memory of 564 1804 explorer.exe 38 PID 1804 wrote to memory of 764 1804 explorer.exe 40 PID 1804 wrote to memory of 764 1804 explorer.exe 40 PID 1804 wrote to memory of 764 1804 explorer.exe 40 PID 1804 wrote to memory of 764 1804 explorer.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9635dc7f7bc526b80b4fed8ddeeede37.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9635dc7f7bc526b80b4fed8ddeeede37.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn qnehsxpw /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\9635dc7f7bc526b80b4fed8ddeeede37.dll\"" /SC ONCE /Z /ST 02:47 /ET 02:594⤵
- Creates scheduled task(s)
PID:2792
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A679F41-29D3-4EFD-89D6-33325ABF2604} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\9635dc7f7bc526b80b4fed8ddeeede37.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\9635dc7f7bc526b80b4fed8ddeeede37.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ouauo" /d "0"5⤵
- Windows security bypass
PID:564
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Fugpuntcyk" /d "0"5⤵
- Windows security bypass
PID:764
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD59635dc7f7bc526b80b4fed8ddeeede37
SHA1062ed276f7d55a4cf137441a437f9507dd787310
SHA25600eb9e819548a07373a5f3aacc0f449171dc3e520cef7086fd7f47d9ad3fc5f3
SHA5124517989bf5181842ae028787affa19a3f1d021eb4c75aa61f23123eeaf4fbe51c79a7a94829f35824b91c543f5b138cb1f3ad043c9081c613592cd378237289c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e