Analysis
-
max time kernel
165s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 14:14
Static task
static1
Behavioral task
behavioral1
Sample
c38e202b9987a0ae6836cf08d74e6e5f.dll
Resource
win7-20231215-en
General
-
Target
c38e202b9987a0ae6836cf08d74e6e5f.dll
-
Size
1.0MB
-
MD5
c38e202b9987a0ae6836cf08d74e6e5f
-
SHA1
b34714e2e3b11035c21db0f24a3968e4b5d7bf5e
-
SHA256
13683e932349de3e5884bf4aa703ad3337a122864903b50cd00d8848a6d8cc8f
-
SHA512
b5f04d84805e51b5a76ff5b52a82de13a772a6259006c853db0e1962f22bf561bf808f8d08f2863a9f85481a00fa29841a68a97a691c6bcd4b950be1ae6675c0
-
SSDEEP
24576:Dgc9GxisYespQ90K5W44ZKtqcuALNLJ2PJgrUsROmbvbfgkqKhRwdkq11Jg:0isYxpg0vxgtqcuABLJ2PiIsROmjbfg4
Malware Config
Extracted
qakbot
402.363
obama109
1633422349
202.134.178.157:443
187.116.124.82:995
73.130.180.25:443
73.52.50.32:443
120.151.47.189:443
181.118.183.94:443
122.11.220.212:2222
103.142.10.177:443
202.165.32.158:2222
70.37.217.196:443
78.191.36.142:995
167.248.100.227:443
103.148.120.144:443
89.101.97.139:443
75.75.179.226:443
120.150.218.241:995
185.250.148.74:443
72.196.22.184:0
81.241.252.59:2078
140.82.49.12:443
136.232.34.70:443
39.52.197.237:995
167.248.117.81:443
81.250.153.227:2222
69.30.186.190:443
73.230.205.91:443
89.137.52.44:443
74.72.237.54:443
96.57.188.174:2078
37.210.152.224:995
94.200.181.154:443
217.17.56.163:2222
217.17.56.163:2078
41.228.22.180:443
115.96.53.68:443
124.123.42.115:2222
38.10.197.234:443
75.66.88.33:443
173.21.10.71:2222
73.151.236.31:443
47.22.148.6:443
173.25.162.221:443
71.74.12.34:443
75.188.35.168:443
206.47.134.234:2222
216.201.162.158:443
67.165.206.193:993
45.46.53.140:2222
76.25.142.196:443
167.248.23.224:443
47.40.196.233:2222
177.94.21.110:995
208.89.170.179:443
167.248.54.34:2222
86.8.177.143:443
181.4.53.6:465
167.248.99.149:443
201.93.111.2:995
24.55.112.61:443
73.77.87.137:443
109.12.111.14:443
181.4.53.6:443
40.131.140.155:995
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
72.252.201.69:443
68.186.192.69:443
24.229.150.54:995
173.25.166.81:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
2.99.100.134:2222
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
24.119.214.7:443
159.2.51.200:2222
110.174.64.179:995
187.101.25.96:32100
174.54.193.186:443
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
24.139.72.117:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
68.204.7.158:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
209.50.20.255:443
97.98.130.50:443
196.117.106.38:995
77.57.204.78:443
191.191.38.8:443
176.251.215.116:443
96.46.103.109:2222
188.210.210.122:443
37.117.191.19:2222
197.90.137.161:61201
24.32.174.175:443
76.84.225.21:443
78.145.153.73:995
69.30.190.105:995
167.248.81.60:443
69.80.113.148:443
217.17.56.163:443
62.23.194.38:443
62.23.194.41:995
199.27.127.129:443
189.210.115.207:443
174.59.226.6:443
73.130.237.36:443
69.253.197.100:443
174.59.242.9:443
177.130.82.197:2222
67.214.30.12:995
174.59.120.69:443
47.181.84.61:443
73.130.239.166:443
217.165.163.21:995
93.8.66.216:443
73.52.114.202:443
186.18.205.199:995
38.10.202.214:443
78.191.44.76:443
96.83.180.29:443
124.123.42.115:2078
105.159.144.186:995
27.223.92.142:995
109.190.253.11:2222
217.17.56.163:465
38.10.201.211:443
92.148.59.207:2222
92.157.171.41:2222
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 1468 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid Process 4048 rundll32.exe 4048 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid Process 4048 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeregsvr32.exedescription pid Process procid_target PID 4820 wrote to memory of 4048 4820 rundll32.exe 89 PID 4820 wrote to memory of 4048 4820 rundll32.exe 89 PID 4820 wrote to memory of 4048 4820 rundll32.exe 89 PID 4048 wrote to memory of 4360 4048 rundll32.exe 95 PID 4048 wrote to memory of 4360 4048 rundll32.exe 95 PID 4048 wrote to memory of 4360 4048 rundll32.exe 95 PID 4048 wrote to memory of 4360 4048 rundll32.exe 95 PID 4048 wrote to memory of 4360 4048 rundll32.exe 95 PID 4360 wrote to memory of 1996 4360 explorer.exe 96 PID 4360 wrote to memory of 1996 4360 explorer.exe 96 PID 4360 wrote to memory of 1996 4360 explorer.exe 96 PID 4112 wrote to memory of 1468 4112 regsvr32.exe 100 PID 4112 wrote to memory of 1468 4112 regsvr32.exe 100 PID 4112 wrote to memory of 1468 4112 regsvr32.exe 100
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn qsonfwr /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll\"" /SC ONCE /Z /ST 17:56 /ET 18:084⤵
- Creates scheduled task(s)
PID:1996
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\c38e202b9987a0ae6836cf08d74e6e5f.dll"2⤵
- Loads dropped DLL
PID:1468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c38e202b9987a0ae6836cf08d74e6e5f
SHA1b34714e2e3b11035c21db0f24a3968e4b5d7bf5e
SHA25613683e932349de3e5884bf4aa703ad3337a122864903b50cd00d8848a6d8cc8f
SHA512b5f04d84805e51b5a76ff5b52a82de13a772a6259006c853db0e1962f22bf561bf808f8d08f2863a9f85481a00fa29841a68a97a691c6bcd4b950be1ae6675c0