Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 10:15
Behavioral task
behavioral1
Sample
1267da257994e424d5a3c7c431898ec2c7c748b354f231ebb07e5e4ccaa0eafc.dll
Resource
win7-20240221-en
General
-
Target
1267da257994e424d5a3c7c431898ec2c7c748b354f231ebb07e5e4ccaa0eafc.dll
-
Size
314KB
-
MD5
30a2fde7780e4928490777897af72057
-
SHA1
a6755dbc251fddb523e1d8762040108aa5198f8e
-
SHA256
1267da257994e424d5a3c7c431898ec2c7c748b354f231ebb07e5e4ccaa0eafc
-
SHA512
89da2592e70ba74a7e96f213dfa13c67085cd03cd2e763e404338d174d09de2e7dafce77c663056e9cf3a966e527bcb8fc20a2a8e8dd0ac316c9dc95b08e9be0
-
SSDEEP
6144:VXMURcNLpyXU9W5rulKJQ8n7fgK3RnHV2HoS:BN2NNyXUXM7fgK3RnHV2HoS
Malware Config
Extracted
qakbot
404.1001
BB24
1681985211
12.172.173.82:20
187.199.85.154:32103
96.56.197.26:2078
197.1.229.119:443
90.104.151.37:2222
90.55.106.37:2222
92.186.69.229:2222
92.136.62.50:2222
70.112.206.5:443
77.126.185.173:443
96.56.197.26:2083
89.36.206.220:995
93.150.183.229:2222
45.246.235.177:995
92.9.45.20:2222
92.154.17.149:2222
88.126.94.4:50000
176.202.45.209:443
91.35.212.133:995
12.172.173.82:50001
12.172.173.82:2087
14.192.241.76:995
190.206.92.41:2222
144.64.226.144:443
71.38.155.217:443
139.226.47.229:995
75.109.111.89:443
68.173.170.110:8443
12.172.173.82:995
47.21.51.138:443
92.189.214.236:2222
87.221.197.91:2222
72.203.216.98:2222
27.109.19.90:2078
68.229.150.95:443
86.225.214.138:2222
92.20.204.198:2222
147.219.4.194:443
92.239.81.124:443
172.90.139.138:2222
74.92.243.115:50000
50.68.186.195:443
41.186.88.38:443
124.149.143.189:2222
201.244.108.183:995
47.205.25.170:443
86.154.216.221:2222
27.99.32.26:2222
96.87.28.170:2222
82.131.134.162:443
76.16.49.134:443
103.111.70.66:443
70.28.50.223:32100
122.184.143.85:443
37.14.229.220:2222
173.88.135.179:443
96.56.197.26:2222
5.194.64.194:2222
43.243.215.210:443
123.3.240.16:995
86.45.66.141:2222
75.143.236.149:443
103.140.174.20:2222
103.42.86.42:995
47.34.30.133:443
184.182.66.109:443
202.186.177.220:443
86.176.80.98:2222
119.82.120.15:443
67.10.2.240:995
172.248.42.122:443
12.172.173.82:22
12.172.173.82:21
91.165.188.74:50000
100.6.31.96:443
24.139.11.137:443
198.2.51.242:993
75.98.154.19:443
50.68.204.71:995
92.149.250.113:2222
12.172.173.82:465
76.86.31.59:443
184.153.132.82:443
2.82.8.80:443
86.136.208.125:443
78.130.215.67:443
161.142.98.36:995
70.26.75.148:2222
78.92.133.215:443
78.192.109.105:2222
94.63.65.146:443
64.121.161.102:443
86.171.131.244:995
209.93.207.224:2222
12.172.173.82:32101
174.4.89.3:443
173.18.122.24:443
70.28.50.223:1194
151.62.97.204:443
72.205.104.134:443
70.28.50.223:3389
103.111.70.66:995
190.75.64.251:2222
76.170.252.153:995
70.28.50.223:2087
190.11.198.76:443
114.143.176.235:443
81.229.117.95:2222
72.134.124.16:443
75.90.41.108:995
92.27.86.48:2222
95.60.243.16:995
105.186.242.17:995
176.142.207.63:443
125.99.76.102:443
35.143.97.145:995
213.67.139.53:2222
91.169.12.198:32100
50.68.204.71:993
85.61.165.153:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
resource yara_rule behavioral2/memory/5100-0-0x0000000063A80000-0x0000000063B63000-memory.dmp upx behavioral2/memory/5100-12-0x0000000063A80000-0x0000000063B63000-memory.dmp upx -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 528 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5100 rundll32.exe 5100 rundll32.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe 1272 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5100 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4052 wrote to memory of 5100 4052 rundll32.exe 70 PID 4052 wrote to memory of 5100 4052 rundll32.exe 70 PID 4052 wrote to memory of 5100 4052 rundll32.exe 70 PID 5100 wrote to memory of 1272 5100 rundll32.exe 87 PID 5100 wrote to memory of 1272 5100 rundll32.exe 87 PID 5100 wrote to memory of 1272 5100 rundll32.exe 87 PID 5100 wrote to memory of 1272 5100 rundll32.exe 87 PID 5100 wrote to memory of 1272 5100 rundll32.exe 87 PID 1272 wrote to memory of 528 1272 wermgr.exe 88 PID 1272 wrote to memory of 528 1272 wermgr.exe 88 PID 1272 wrote to memory of 528 1272 wermgr.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1267da257994e424d5a3c7c431898ec2c7c748b354f231ebb07e5e4ccaa0eafc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1267da257994e424d5a3c7c431898ec2c7c748b354f231ebb07e5e4ccaa0eafc.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\ping.exeping -n 3 yahoo.com4⤵
- Runs ping.exe
PID:528
-
-
-