Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-12-2023 14:14
Static task
static1
Behavioral task
behavioral1
Sample
c38e202b9987a0ae6836cf08d74e6e5f.dll
Resource
win7-20231215-en
General
-
Target
c38e202b9987a0ae6836cf08d74e6e5f.dll
-
Size
1.0MB
-
MD5
c38e202b9987a0ae6836cf08d74e6e5f
-
SHA1
b34714e2e3b11035c21db0f24a3968e4b5d7bf5e
-
SHA256
13683e932349de3e5884bf4aa703ad3337a122864903b50cd00d8848a6d8cc8f
-
SHA512
b5f04d84805e51b5a76ff5b52a82de13a772a6259006c853db0e1962f22bf561bf808f8d08f2863a9f85481a00fa29841a68a97a691c6bcd4b950be1ae6675c0
-
SSDEEP
24576:Dgc9GxisYespQ90K5W44ZKtqcuALNLJ2PJgrUsROmbvbfgkqKhRwdkq11Jg:0isYxpg0vxgtqcuABLJ2PiIsROmjbfg4
Malware Config
Extracted
qakbot
402.363
obama109
1633422349
202.134.178.157:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
181.118.183.94:443
122.11.220.212:2222
103.142.10.177:443
202.165.32.158:2222
70.37.217.196:443
78.191.36.142:995
167.248.100.227:443
103.148.120.144:443
89.101.97.139:443
75.75.179.226:443
120.150.218.241:995
185.250.148.74:443
72.196.22.184:0
81.241.252.59:2078
140.82.49.12:443
136.232.34.70:443
39.52.197.237:995
167.248.117.81:443
81.250.153.227:2222
69.30.186.190:443
73.230.205.91:443
89.137.52.44:443
74.72.237.54:443
96.57.188.174:2078
37.210.152.224:995
94.200.181.154:443
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
115.96.53.68:443
124.123.42.115:2222
38.10.197.234:443
75.66.88.33:443
173.21.10.71:2222
73.151.236.31:443
47.22.148.6:443
173.25.162.221:443
71.74.12.34:443
75.188.35.168:443
206.47.134.234:2222
216.201.162.158:443
67.165.206.193:993
45.46.53.140:2222
76.25.142.196:443
167.248.23.224:443
47.40.196.233:2222
177.94.21.110:995
208.89.170.179:443
167.248.54.34:2222
86.8.177.143:443
181.4.53.6:465
167.248.99.149:443
201.93.111.2:995
24.55.112.61:443
73.77.87.137:443
109.12.111.14:443
181.4.53.6:443
40.131.140.155:995
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
72.252.201.69:443
68.186.192.69:443
24.229.150.54:995
173.25.166.81:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
2.99.100.134:2222
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
24.119.214.7:443
159.2.51.200:2222
110.174.64.179:995
187.101.25.96:32100
174.54.193.186:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.106.38:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
197.90.137.161:61201
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
217.17.56.163:443
62.23.194.38:443
62.23.194.41:995
199.27.127.129:443
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 1440 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
explorer.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ynqoyyrottaaa explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 3000 rundll32.exe 1440 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 3000 rundll32.exe 1440 regsvr32.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 2988 wrote to memory of 3000 2988 rundll32.exe 28 PID 2988 wrote to memory of 3000 2988 rundll32.exe 28 PID 2988 wrote to memory of 3000 2988 rundll32.exe 28 PID 2988 wrote to memory of 3000 2988 rundll32.exe 28 PID 2988 wrote to memory of 3000 2988 rundll32.exe 28 PID 2988 wrote to memory of 3000 2988 rundll32.exe 28 PID 2988 wrote to memory of 3000 2988 rundll32.exe 28 PID 3000 wrote to memory of 2328 3000 rundll32.exe 29 PID 3000 wrote to memory of 2328 3000 rundll32.exe 29 PID 3000 wrote to memory of 2328 3000 rundll32.exe 29 PID 3000 wrote to memory of 2328 3000 rundll32.exe 29 PID 3000 wrote to memory of 2328 3000 rundll32.exe 29 PID 3000 wrote to memory of 2328 3000 rundll32.exe 29 PID 2328 wrote to memory of 2812 2328 explorer.exe 31 PID 2328 wrote to memory of 2812 2328 explorer.exe 31 PID 2328 wrote to memory of 2812 2328 explorer.exe 31 PID 2328 wrote to memory of 2812 2328 explorer.exe 31 PID 352 wrote to memory of 1448 352 taskeng.exe 35 PID 352 wrote to memory of 1448 352 taskeng.exe 35 PID 352 wrote to memory of 1448 352 taskeng.exe 35 PID 352 wrote to memory of 1448 352 taskeng.exe 35 PID 352 wrote to memory of 1448 352 taskeng.exe 35 PID 1448 wrote to memory of 1440 1448 regsvr32.exe 36 PID 1448 wrote to memory of 1440 1448 regsvr32.exe 36 PID 1448 wrote to memory of 1440 1448 regsvr32.exe 36 PID 1448 wrote to memory of 1440 1448 regsvr32.exe 36 PID 1448 wrote to memory of 1440 1448 regsvr32.exe 36 PID 1448 wrote to memory of 1440 1448 regsvr32.exe 36 PID 1448 wrote to memory of 1440 1448 regsvr32.exe 36 PID 1440 wrote to memory of 2288 1440 regsvr32.exe 39 PID 1440 wrote to memory of 2288 1440 regsvr32.exe 39 PID 1440 wrote to memory of 2288 1440 regsvr32.exe 39 PID 1440 wrote to memory of 2288 1440 regsvr32.exe 39 PID 1440 wrote to memory of 2288 1440 regsvr32.exe 39 PID 1440 wrote to memory of 2288 1440 regsvr32.exe 39 PID 2288 wrote to memory of 2968 2288 explorer.exe 38 PID 2288 wrote to memory of 2968 2288 explorer.exe 38 PID 2288 wrote to memory of 2968 2288 explorer.exe 38 PID 2288 wrote to memory of 2968 2288 explorer.exe 38
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn mvijqjmy /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll\"" /SC ONCE /Z /ST 17:55 /ET 18:074⤵
- Creates scheduled task(s)
PID:2812
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {10B5E97D-B1C6-4472-8384-615B9BAE235A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ycjgvkm" /d "0"5⤵PID:2032
-
-
-
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Eakit" /d "0"1⤵PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c38e202b9987a0ae6836cf08d74e6e5f
SHA1b34714e2e3b11035c21db0f24a3968e4b5d7bf5e
SHA25613683e932349de3e5884bf4aa703ad3337a122864903b50cd00d8848a6d8cc8f
SHA512b5f04d84805e51b5a76ff5b52a82de13a772a6259006c853db0e1962f22bf561bf808f8d08f2863a9f85481a00fa29841a68a97a691c6bcd4b950be1ae6675c0