Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 14:00
Static task
static1
Behavioral task
behavioral1
Sample
bfe9c5ad4132e6f317351a8f17450d09.dll
Resource
win7-20231215-en
General
-
Target
bfe9c5ad4132e6f317351a8f17450d09.dll
-
Size
1.0MB
-
MD5
bfe9c5ad4132e6f317351a8f17450d09
-
SHA1
209da31664e8cb26e12b15181b85e2e93e404ef7
-
SHA256
45f9221e1b71c4d31830a1ded1809bf510facdfc809012d898990205d34b6eb3
-
SHA512
a04f1066962050b46d22347b6ab53409a6f70d316828e95bbdba540b5e829e8bd2fd8094f400905bc7ac44e41abe946fe50de4caddd22bbe7ce01700492209b7
-
SSDEEP
24576:8+N4Rsx6ZIlcgFagUOqtQ1e78l1T9N36OfMMElHNGlpJMFymEYe/uAg9JXkQKLKT:8lIOgFa41l1T9N36OUMzlpJMFymEYe/y
Malware Config
Extracted
qakbot
402.363
tr
1633334141
75.75.179.226:443
185.250.148.74:443
122.11.220.212:2222
120.150.218.241:995
103.148.120.144:443
140.82.49.12:443
40.131.140.155:995
206.47.134.234:2222
73.230.205.91:443
190.198.206.189:2222
103.157.122.198:995
81.250.153.227:2222
167.248.100.227:443
96.57.188.174:2078
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
136.232.34.70:443
68.186.192.69:443
167.248.111.245:443
81.241.252.59:2078
94.200.181.154:443
47.22.148.6:443
208.89.170.179:443
73.77.87.137:443
96.46.103.226:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
109.12.111.14:443
216.201.162.158:443
73.25.124.140:2222
181.118.183.94:443
174.54.58.170:443
24.152.219.253:995
124.123.42.115:2222
76.25.142.196:443
45.46.53.140:2222
37.210.152.224:995
173.21.10.71:2222
68.13.157.69:0
75.89.195.186:995
67.165.206.193:993
71.74.12.34:443
24.119.214.7:443
75.66.88.33:443
73.151.236.31:443
89.101.97.139:443
159.2.51.200:2222
78.191.36.142:995
75.188.35.168:443
95.77.223.148:443
105.198.236.99:443
110.174.64.179:995
47.40.196.233:2222
201.93.111.2:995
187.56.71.109:995
187.101.25.96:32100
174.54.193.186:443
86.8.177.143:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
72.252.201.69:443
68.117.229.117:443
167.248.117.81:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
167.248.99.149:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
69.30.186.190:443
72.196.22.184:443
167.248.23.224:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.75.181:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
90.197.155.33:443
197.90.137.161:61201
70.37.217.196:443
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
2.99.100.134:2222
217.17.56.163:443
39.52.236.68:995
71.190.231.182:443
62.23.194.38:443
62.23.194.41:995
173.25.166.81:443
199.27.127.129:443
24.229.150.54:995
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
24.55.112.61:443
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
186.87.135.68:995
80.6.192.58:443
187.156.138.172:443
82.77.137.101:995
173.234.155.233:443
5.238.148.193:61202
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 1860 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid Process 944 rundll32.exe 944 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid Process 944 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exedescription pid Process procid_target PID 2920 wrote to memory of 944 2920 rundll32.exe 87 PID 2920 wrote to memory of 944 2920 rundll32.exe 87 PID 2920 wrote to memory of 944 2920 rundll32.exe 87 PID 944 wrote to memory of 688 944 rundll32.exe 93 PID 944 wrote to memory of 688 944 rundll32.exe 93 PID 944 wrote to memory of 688 944 rundll32.exe 93 PID 944 wrote to memory of 688 944 rundll32.exe 93 PID 944 wrote to memory of 688 944 rundll32.exe 93 PID 688 wrote to memory of 3828 688 explorer.exe 94 PID 688 wrote to memory of 3828 688 explorer.exe 94 PID 688 wrote to memory of 3828 688 explorer.exe 94 PID 1944 wrote to memory of 1860 1944 regsvr32.exe 100 PID 1944 wrote to memory of 1860 1944 regsvr32.exe 100 PID 1944 wrote to memory of 1860 1944 regsvr32.exe 100
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe9c5ad4132e6f317351a8f17450d09.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe9c5ad4132e6f317351a8f17450d09.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ylzmurcn /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\bfe9c5ad4132e6f317351a8f17450d09.dll\"" /SC ONCE /Z /ST 16:47 /ET 16:594⤵
- Creates scheduled task(s)
PID:3828
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\bfe9c5ad4132e6f317351a8f17450d09.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\bfe9c5ad4132e6f317351a8f17450d09.dll"2⤵
- Loads dropped DLL
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1007KB
MD578a64fddae348e848891812f9569fd32
SHA16aa3fa83ba0c782277d9b9f9477ea7b41e7854ac
SHA2567b58263e3fc8e06fc72e1097fa0326c348cd6ce51579c8dcec4dd8d339bd9ae1
SHA5129876db61a3fbb5a33195ed525ab8dd6cf7ff2eeeda8e05b406a3974df1b0a90b4022fe8691750123ce9753bbe3b9cabe606a45b51cd640f6065e912714bc4095
-
Filesize
187KB
MD5b699e31f60abb48719bf2dc001db92b3
SHA1054030851bb0c68448d3186fc2ced01a9bd3dea3
SHA256b037c1330f6aff5fc3f91215abde4d77373d070c40e98619c7cc218ea93b8013
SHA51299c4e80af10b8023fd198fead6fb740c21d55f947336d873f70e157570144f76d3efa1386d04a4c446ee36cf5887e43567cc1b64be4f643e3e836226b52fe2de