Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-12-2023 17:48
Static task
static1
Behavioral task
behavioral1
Sample
fc77868aae55037dccd9e6734c0bda1f.dll
Resource
win7-20231129-en
General
-
Target
fc77868aae55037dccd9e6734c0bda1f.dll
-
Size
820KB
-
MD5
fc77868aae55037dccd9e6734c0bda1f
-
SHA1
625c1d5de4fb7e5fae3440892e122685b004f88e
-
SHA256
dbe3468fbf17c02a99b49ee5fca4837811e4bf8e2877374423c2d4512f060569
-
SHA512
c494179fb0bd6cfc56e19795830c4ea1afdc1eda4c70ae0420c9e967a4d4c7425023efdb41d7e5bd8ac27b3ff0cb10e7212929d7d27794f2d0575316a9bea327
-
SSDEEP
24576:nO6c3oCrVA7bEK7mJaW2eX8TvE81gIzsk6EzCUfk7Ou:duVeEK7mmeX8TBgIzsk6hUf4h
Malware Config
Extracted
qakbot
402.363
obama112
1633682302
98.157.235.126:443
124.123.42.115:2222
185.250.148.74:443
73.77.87.137:443
188.50.169.158:443
216.201.162.158:443
174.54.193.186:443
27.223.92.142:995
220.255.25.28:2222
103.142.10.177:443
2.222.167.138:443
66.177.215.152:0
122.11.220.212:2222
85.109.229.54:995
140.82.49.12:443
199.27.127.129:443
209.50.20.255:443
73.230.205.91:443
200.232.214.222:995
81.241.252.59:2078
47.22.148.6:443
188.50.26.190:995
41.228.22.180:443
41.86.42.158:995
37.210.152.224:995
96.57.188.174:2078
41.86.42.158:443
94.200.181.154:443
182.176.180.73:443
63.143.92.99:995
69.30.186.190:443
167.248.117.81:443
73.52.50.32:443
72.173.78.211:443
73.77.87.137:995
136.232.34.70:443
40.131.140.155:995
181.118.183.94:443
93.48.58.123:2222
187.250.159.104:443
186.32.163.199:443
89.137.52.44:443
120.150.218.241:995
38.10.197.234:443
203.213.107.174:443
76.25.142.196:443
110.174.64.179:995
202.134.178.157:443
73.151.236.31:443
173.21.10.71:2222
45.46.53.140:2222
71.74.12.34:443
187.172.240.28:443
181.4.53.6:465
47.40.196.233:2222
189.136.217.97:995
67.165.206.193:993
68.204.7.158:443
86.8.177.143:443
201.93.111.2:995
89.101.97.139:443
109.12.111.14:443
24.55.112.61:443
66.103.170.104:2222
24.139.72.117:443
24.229.150.54:995
177.170.201.134:995
209.142.97.161:995
72.252.201.69:443
74.72.237.54:443
2.99.100.134:2222
81.250.153.227:2222
197.90.147.89:61201
66.177.215.152:50010
131.191.107.34:995
80.6.192.58:443
103.148.120.144:443
75.75.179.226:443
24.171.50.5:443
77.57.204.78:443
49.33.237.65:443
75.188.35.168:443
120.151.47.189:443
173.25.162.221:443
201.6.246.227:995
66.177.215.152:443
217.17.56.163:2222
202.165.32.158:2222
39.52.229.8:995
42.60.70.14:443
73.140.38.124:443
167.248.100.227:443
63.70.164.200:443
189.131.221.201:443
181.84.114.46:443
167.248.99.149:443
177.94.21.110:995
50.54.32.149:443
189.224.181.39:443
24.119.214.7:443
177.94.125.59:995
73.130.180.25:443
217.17.56.163:2078
75.66.88.33:443
206.47.134.234:2222
167.248.54.34:2222
181.4.53.6:443
190.198.206.189:2222
167.248.111.245:443
96.46.103.226:443
73.25.124.140:2222
24.152.219.253:995
68.186.192.69:443
162.210.220.137:443
174.54.58.170:443
103.246.130.114:1194
103.246.130.35:21
103.246.130.2:20
103.246.130.122:20
105.198.236.99:443
103.157.122.198:995
4.34.193.180:995
159.2.51.200:2222
187.101.25.96:32100
76.84.230.103:443
174.59.35.191:443
173.63.245.129:443
68.117.229.117:443
75.163.81.130:995
76.84.32.159:443
147.92.51.49:443
76.84.226.17:443
68.13.157.69:443
167.248.126.223:443
72.196.22.184:443
98.22.92.139:995
97.98.130.50:443
196.117.226.146:995
191.191.38.8:443
188.210.210.122:443
96.46.103.109:2222
37.117.191.19:2222
24.32.174.175:443
76.84.225.21:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Processes:
reg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Ynntszayho = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Oiqnuyinyi = "0" reg.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 2456 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\542f823e = 8d8541737d4670768ba77f83f716c483cd5c22e976fe40a2f452c1dad68722f07d5001718df6f35219a55579a4174437aca63197f3bf explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\61b05270 = f0c758a3125b5c0b59ab6aeb9bc7171e3a243bfce558fd829fe5507ba8ace6f037fd9ccdd615c17b82b70b5a9575c5eb547e4e71d4ab4ba83ea2b871a52254a428914856b0a4e9fcd0392c5ad6145b19766c74d74c96c9a70aab51f164ab8d7b03ef91ad2b08b665defe785d60085ab4478d35d645fd7e6171b2f18d0377f8bb1725db7f0d0b2c604e293a166f850e88a333db6f explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\63f1720c = 727a85cbf95c47d4ac876ace0d90fac2ea54a8a96a5e12b58a2250dd5a9e87026ae78bc2fc explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\2b66edc8 = 3b3272c705184063be13b98d52e2d654fe37a5a2b5bd20247e9dbbf1f212e8 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\542f823e = 8d8556737d4645e2bd3c0b0b05813f12aee7f59bd7d68a40b1bb38a9644cd36f8863618232c9cd8be51f8dd32cd23af05b81b78f5a826fdcf3d6256a6b049fb73c04b2ba6b18879f412c6a explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Gigtucgwzloe explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\db4d1569 = 938260491b95ae7fe461415bf388146e0a43bb5a38adf8d43b5ddacd1ac67b389415827f6f5d735eb891e828be2a1fd08e8b48b44e1208150ee63d1b explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\a6455ae3 = 1023ef85c74ac099c5f080ed0876bc992785ffb7245f32269655c0649cd0f75c3a1ffe3ce459385a0d98663367a753fcdc172bac2443fad451cc093485 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\1ef93d86 = 23ef97233e7eb2d604765cbb9e68417d9b30c106376a51eebf26bdebdc5aa71fcb explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Gigtucgwzloe\d90c3515 = 43ed587c9952230a7de2f583f2d8d52abcb3d4f5d629958e10c48c02f8bed9e25f5c58a1e0dc1f3a392ff5c39b8098e84885fc80c268a58043340a7a2c0a78be603e52f18c62a324deeca3e68e9ea771a110c00a165777bd8b3c1dc4cd3a5df3 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 2856 rundll32.exe 2456 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
rundll32.exeregsvr32.exepid Process 2856 rundll32.exe 2456 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 2852 wrote to memory of 2856 2852 rundll32.exe 17 PID 2852 wrote to memory of 2856 2852 rundll32.exe 17 PID 2852 wrote to memory of 2856 2852 rundll32.exe 17 PID 2852 wrote to memory of 2856 2852 rundll32.exe 17 PID 2852 wrote to memory of 2856 2852 rundll32.exe 17 PID 2852 wrote to memory of 2856 2852 rundll32.exe 17 PID 2852 wrote to memory of 2856 2852 rundll32.exe 17 PID 2856 wrote to memory of 2192 2856 rundll32.exe 29 PID 2856 wrote to memory of 2192 2856 rundll32.exe 29 PID 2856 wrote to memory of 2192 2856 rundll32.exe 29 PID 2856 wrote to memory of 2192 2856 rundll32.exe 29 PID 2856 wrote to memory of 2192 2856 rundll32.exe 29 PID 2856 wrote to memory of 2192 2856 rundll32.exe 29 PID 2192 wrote to memory of 2888 2192 explorer.exe 30 PID 2192 wrote to memory of 2888 2192 explorer.exe 30 PID 2192 wrote to memory of 2888 2192 explorer.exe 30 PID 2192 wrote to memory of 2888 2192 explorer.exe 30 PID 1604 wrote to memory of 2392 1604 taskeng.exe 35 PID 1604 wrote to memory of 2392 1604 taskeng.exe 35 PID 1604 wrote to memory of 2392 1604 taskeng.exe 35 PID 1604 wrote to memory of 2392 1604 taskeng.exe 35 PID 1604 wrote to memory of 2392 1604 taskeng.exe 35 PID 2392 wrote to memory of 2456 2392 regsvr32.exe 36 PID 2392 wrote to memory of 2456 2392 regsvr32.exe 36 PID 2392 wrote to memory of 2456 2392 regsvr32.exe 36 PID 2392 wrote to memory of 2456 2392 regsvr32.exe 36 PID 2392 wrote to memory of 2456 2392 regsvr32.exe 36 PID 2392 wrote to memory of 2456 2392 regsvr32.exe 36 PID 2392 wrote to memory of 2456 2392 regsvr32.exe 36 PID 2456 wrote to memory of 2816 2456 regsvr32.exe 41 PID 2456 wrote to memory of 2816 2456 regsvr32.exe 41 PID 2456 wrote to memory of 2816 2456 regsvr32.exe 41 PID 2456 wrote to memory of 2816 2456 regsvr32.exe 41 PID 2456 wrote to memory of 2816 2456 regsvr32.exe 41 PID 2456 wrote to memory of 2816 2456 regsvr32.exe 41 PID 2816 wrote to memory of 2492 2816 explorer.exe 38 PID 2816 wrote to memory of 2492 2816 explorer.exe 38 PID 2816 wrote to memory of 2492 2816 explorer.exe 38 PID 2816 wrote to memory of 2492 2816 explorer.exe 38 PID 2816 wrote to memory of 1992 2816 explorer.exe 40 PID 2816 wrote to memory of 1992 2816 explorer.exe 40 PID 2816 wrote to memory of 1992 2816 explorer.exe 40 PID 2816 wrote to memory of 1992 2816 explorer.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc77868aae55037dccd9e6734c0bda1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc77868aae55037dccd9e6734c0bda1f.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn fgmpbbke /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\fc77868aae55037dccd9e6734c0bda1f.dll\"" /SC ONCE /Z /ST 06:49 /ET 07:014⤵
- Creates scheduled task(s)
PID:2888
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F81ACF88-994D-468E-A1AF-CABF332059A8} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\fc77868aae55037dccd9e6734c0bda1f.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\fc77868aae55037dccd9e6734c0bda1f.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2816
-
-
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ynntszayho" /d "0"1⤵
- Windows security bypass
PID:2492
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Oiqnuyinyi" /d "0"1⤵
- Windows security bypass
PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5f66a662db37858b85d0ad354419d6b21
SHA115146136f0405261be59ccccde94bac62d6ec25c
SHA256e3e0b6219f2df10264d26ced50d1df3b55bfc8d2a73eb2d6439a02214cbd3601
SHA51283b098295a7a96698efb84f9c2adfde9424a7fae88517239feccafb51f54184c2db210844e1cb922c807bdc32514f1aeb80e57453f5d677fbedacb74070b2ef1
-
Filesize
233KB
MD5dfd95e6ca036f49affef22e0242888db
SHA16a2a9b68fc6aa6e4896941fb522b578623df4071
SHA25604fe155f5ba4d99cea69aff270cce01a3ea3b64761a3f51612fbe2a24ef6478d
SHA5126e37509c5ec51f56ed0aa09f21d81d645f35dd7e180c0609a9e683bbd83b0411a512c5e55746ce8c38fbf9743febdee36e567bb73e422a75411449ffebe53788