Analysis
-
max time kernel
143s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-12-2023 17:17
Static task
static1
Behavioral task
behavioral1
Sample
f4b4f95f4c8d9f32dcd54565a0626f6e.dll
Resource
win7-20231215-en
General
-
Target
f4b4f95f4c8d9f32dcd54565a0626f6e.dll
-
Size
820KB
-
MD5
f4b4f95f4c8d9f32dcd54565a0626f6e
-
SHA1
c423b4ae7c02841400f29d16609131d333618a06
-
SHA256
608a569b3caa54231e76b65fe3e1945a4c8af8a16eb1707a1ddb687fb3228495
-
SHA512
66c164ed0fd57a8d59d42db3d5369f98432e327ee182af7f7f1fe20c486b27ce94ef1c79977ca9978a3a568d1d7cc54a3a1ef770f7d55815c207b73393cd5e1d
-
SSDEEP
24576:IO6c3oCrVA7bEK7mJaW2eX8TvE81oIzsk6EzCUfk7uu:GuVeEK7mmeX8TBoIzsk6hUf4B
Malware Config
Extracted
qakbot
402.363
obama112
1633682302
98.157.235.126:443
124.123.42.115:2222
185.250.148.74:443
73.77.87.137:443
188.50.169.158:443
216.201.162.158:443
174.54.193.186:443
27.223.92.142:995
220.255.25.28:2222
103.142.10.177:443
2.222.167.138:443
66.177.215.152:0
122.11.220.212:2222
85.109.229.54:995
140.82.49.12:443
199.27.127.129:443
209.50.20.255:443
73.230.205.91:443
200.232.214.222:995
81.241.252.59:2078
47.22.148.6:443
188.50.26.190:995
41.228.22.180:443
41.86.42.158:995
37.210.152.224:995
96.57.188.174:2078
41.86.42.158:443
94.200.181.154:443
182.176.180.73:443
63.143.92.99:995
69.30.186.190:443
167.248.117.81:443
73.52.50.32:443
72.173.78.211:443
73.77.87.137:995
136.232.34.70:443
40.131.140.155:995
181.118.183.94:443
93.48.58.123:2222
187.250.159.104:443
186.32.163.199:443
89.137.52.44:443
120.150.218.241:995
38.10.197.234:443
203.213.107.174:443
76.25.142.196:443
110.174.64.179:995
202.134.178.157:443
73.151.236.31:443
173.21.10.71:2222
45.46.53.140:2222
71.74.12.34:443
187.172.240.28:443
181.4.53.6:465
47.40.196.233:2222
189.136.217.97:995
67.165.206.193:993
68.204.7.158:443
86.8.177.143:443
201.93.111.2:995
89.101.97.139:443
109.12.111.14:443
24.55.112.61:443
66.103.170.104:2222
24.139.72.117:443
24.229.150.54:995
177.170.201.134:995
209.142.97.161:995
72.252.201.69:443
74.72.237.54:443
2.99.100.134:2222
81.250.153.227:2222
197.90.147.89:61201
66.177.215.152:50010
131.191.107.34:995
80.6.192.58:443
103.148.120.144:443
75.75.179.226:443
24.171.50.5:443
77.57.204.78:443
49.33.237.65:443
75.188.35.168:443
120.151.47.189:443
173.25.162.221:443
201.6.246.227:995
66.177.215.152:443
217.17.56.163:2222
202.165.32.158:2222
39.52.229.8:995
42.60.70.14:443
73.140.38.124:443
167.248.100.227:443
63.70.164.200:443
189.131.221.201:443
181.84.114.46:443
167.248.99.149:443
177.94.21.110:995
50.54.32.149:443
189.224.181.39:443
24.119.214.7:443
177.94.125.59:995
73.130.180.25:443
217.17.56.163:2078
75.66.88.33:443
206.47.134.234:2222
167.248.54.34:2222
181.4.53.6:443
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
68.186.192.69:443
162.210.220.137:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
159.2.51.200:2222
187.101.25.96:32100
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
97.98.130.50:443
196.117.226.146:995
191.191.38.8:443
188.210.210.122:443
96.46.103.109:2222
37.117.191.19:2222
24.32.174.175:443
76.84.225.21:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Zkwmvrwuro = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Eavgawkhr = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 1644 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\ffcca912 = 8011e94c13d681e628e2362c7f0df4ee7d3a6a3c151d6245a2dfb711cfc9d59ebcfba3f765c27e3321fc137870b976f141de8d1fa718cb037057a04d4fc8003fcb1e872393eefb30f899cd0fd2e0a60726ac799da8262e9df39a2d4877fa8c305505fd2f7ff3107265ecd0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\4531ee0b = 8b7da503a7e6f697fd91a79d4c94f2039c36699ca4cea76e0f7c86ba0bbc5f160f9ec8ea0d974d5d1d0b8056a2e9a618935c97c53e514230c570ec44f1869e30bfae3f37ed948357820c5d9dbd explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\3839a181 = 57905f515a688da19e7ab43b8ca628000d7cf3a3dccd7f9dc465604d1dadd56e93b0e5ceaae4e7e80d0b29955798 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\ca53795c = 4ddb3568e7382dfa8a8d0e21c85d2b40736f4e701aa60fe6fb10f0114c2939fd9894b7a2238613e7aa5f1dedf8ff598b8de40505c9a2ccc56ce9ca7a7a177a446d2e77e368044c59698defb0a266e009b8e9131e4c1f93c94c26720871f326947d0adbaf1074d90ceab1 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\b51a16aa = 3aaff3f6c4842135667f91ecaca2f3dff52ec793c01bbb371e932a185371d2bb2dc86fc278f0296f93e2a87dde0fa2438930c1bc1d95108ffde99fa4bf279ba41088ce explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Smlsuiigixz explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\ca53795c = 4ddb2268e73818080578369518499c42068e145de80d95477ea10cfe23934e54de04138370c2fd19c9512f1a2376a8de03d393a434f1e2d95f6148448625d4c26a216cb6241624443ec7c319e0f4bc2eb8319c4eb8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\fd8d896e = 3aec43add7c11627c6a5415e43ed34a4ed0aa100562aae7980bd7c69e20b549b314a876cbc4dc1c643eaf80a5da6ac24deed1009f95fe34a04a352d797fb7782 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\8085c6e4 = 98952cc8239c4b24e54c8c0ca5a1747bbaff83ce96c6c1d14d3452a044f8d7a83ee727782f004a0ce20d160bce4a57907d56996c53e505d5cb011868107784a416d2622ef7c6fba9506196a115a563b18fe077bc9c27 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Smlsuiigixz\4770ce77 = 7e3414d137fbc663d7ef365f13d624ab32879f7fffb88932f7b7e9f0e3ed4c69c85ed20796e927b28f5b4c81a1847567a4e27f6d8d62 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 3032 rundll32.exe 1644 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 3032 rundll32.exe 1644 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 2672 wrote to memory of 3032 2672 rundll32.exe 27 PID 2672 wrote to memory of 3032 2672 rundll32.exe 27 PID 2672 wrote to memory of 3032 2672 rundll32.exe 27 PID 2672 wrote to memory of 3032 2672 rundll32.exe 27 PID 2672 wrote to memory of 3032 2672 rundll32.exe 27 PID 2672 wrote to memory of 3032 2672 rundll32.exe 27 PID 2672 wrote to memory of 3032 2672 rundll32.exe 27 PID 3032 wrote to memory of 2052 3032 rundll32.exe 29 PID 3032 wrote to memory of 2052 3032 rundll32.exe 29 PID 3032 wrote to memory of 2052 3032 rundll32.exe 29 PID 3032 wrote to memory of 2052 3032 rundll32.exe 29 PID 3032 wrote to memory of 2052 3032 rundll32.exe 29 PID 3032 wrote to memory of 2052 3032 rundll32.exe 29 PID 2052 wrote to memory of 2212 2052 explorer.exe 31 PID 2052 wrote to memory of 2212 2052 explorer.exe 31 PID 2052 wrote to memory of 2212 2052 explorer.exe 31 PID 2052 wrote to memory of 2212 2052 explorer.exe 31 PID 2896 wrote to memory of 620 2896 taskeng.exe 35 PID 2896 wrote to memory of 620 2896 taskeng.exe 35 PID 2896 wrote to memory of 620 2896 taskeng.exe 35 PID 2896 wrote to memory of 620 2896 taskeng.exe 35 PID 2896 wrote to memory of 620 2896 taskeng.exe 35 PID 620 wrote to memory of 1644 620 regsvr32.exe 36 PID 620 wrote to memory of 1644 620 regsvr32.exe 36 PID 620 wrote to memory of 1644 620 regsvr32.exe 36 PID 620 wrote to memory of 1644 620 regsvr32.exe 36 PID 620 wrote to memory of 1644 620 regsvr32.exe 36 PID 620 wrote to memory of 1644 620 regsvr32.exe 36 PID 620 wrote to memory of 1644 620 regsvr32.exe 36 PID 1644 wrote to memory of 240 1644 regsvr32.exe 37 PID 1644 wrote to memory of 240 1644 regsvr32.exe 37 PID 1644 wrote to memory of 240 1644 regsvr32.exe 37 PID 1644 wrote to memory of 240 1644 regsvr32.exe 37 PID 1644 wrote to memory of 240 1644 regsvr32.exe 37 PID 1644 wrote to memory of 240 1644 regsvr32.exe 37 PID 240 wrote to memory of 2580 240 explorer.exe 39 PID 240 wrote to memory of 2580 240 explorer.exe 39 PID 240 wrote to memory of 2580 240 explorer.exe 39 PID 240 wrote to memory of 2580 240 explorer.exe 39 PID 240 wrote to memory of 1964 240 explorer.exe 41 PID 240 wrote to memory of 1964 240 explorer.exe 41 PID 240 wrote to memory of 1964 240 explorer.exe 41 PID 240 wrote to memory of 1964 240 explorer.exe 41
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4b4f95f4c8d9f32dcd54565a0626f6e.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn riscmddtj /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\f4b4f95f4c8d9f32dcd54565a0626f6e.dll\"" /SC ONCE /Z /ST 18:06 /ET 18:183⤵
- Creates scheduled task(s)
PID:2212
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4b4f95f4c8d9f32dcd54565a0626f6e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2672
-
C:\Windows\system32\taskeng.exetaskeng.exe {8914BF12-E7CD-456C-B6AE-B6F25415D6A0} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\f4b4f95f4c8d9f32dcd54565a0626f6e.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\f4b4f95f4c8d9f32dcd54565a0626f6e.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Zkwmvrwuro" /d "0"5⤵
- Windows security bypass
PID:2580
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Eavgawkhr" /d "0"5⤵
- Windows security bypass
PID:1964
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD5f4b4f95f4c8d9f32dcd54565a0626f6e
SHA1c423b4ae7c02841400f29d16609131d333618a06
SHA256608a569b3caa54231e76b65fe3e1945a4c8af8a16eb1707a1ddb687fb3228495
SHA51266c164ed0fd57a8d59d42db3d5369f98432e327ee182af7f7f1fe20c486b27ce94ef1c79977ca9978a3a568d1d7cc54a3a1ef770f7d55815c207b73393cd5e1d