Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
a3eb42abc461cd5cc26bc87a8e7c93ec1eaa46b40c15a55b94b7c76b48cf0b0a.dll
Resource
win7-20240221-en
General
-
Target
a3eb42abc461cd5cc26bc87a8e7c93ec1eaa46b40c15a55b94b7c76b48cf0b0a.dll
-
Size
1.1MB
-
MD5
cf300cd47a865824c2f8705aebae6eee
-
SHA1
a064a0ee077e465f14f435676ff794ecc80f08c6
-
SHA256
a3eb42abc461cd5cc26bc87a8e7c93ec1eaa46b40c15a55b94b7c76b48cf0b0a
-
SHA512
36f0f12637cedd0ca15ec37ac41cb1415dc190d67d94693c49178e751b1db7f79f0ca400ee6fd4d8d31296d8773958cf077d295232647c62512a14f80b322402
-
SSDEEP
24576:UmfEXFuca6UFUqybkX0YuSw7zMYQ0a4lFb2:UmMu6+UfYXXuSoWx+
Malware Config
Extracted
qakbot
403.573
obama181
1651246804
47.23.89.62:995
2.34.12.8:443
38.70.253.226:2222
47.23.89.62:993
75.99.168.194:443
41.228.22.180:443
140.82.49.12:443
148.64.96.100:443
108.60.213.141:443
2.50.4.57:443
187.208.137.144:443
187.207.47.198:61202
187.250.114.15:443
86.132.13.91:2078
149.135.101.20:443
67.209.195.198:443
187.172.170.129:443
190.252.242.69:443
174.69.215.101:443
75.99.168.194:61201
202.134.152.2:2222
185.249.85.175:443
187.114.156.142:993
89.101.97.139:443
179.158.105.44:443
72.252.157.172:995
47.156.191.217:443
103.87.95.133:2222
82.152.39.39:443
70.46.220.114:443
45.9.20.200:443
191.99.191.28:443
173.174.216.62:443
67.165.206.193:993
149.28.238.199:443
45.76.167.26:995
149.28.238.199:995
140.82.63.183:995
45.63.1.12:995
45.63.1.12:443
144.202.2.175:443
45.76.167.26:443
144.202.2.175:995
144.202.3.39:995
140.82.63.183:443
144.202.3.39:443
86.195.158.178:2222
102.65.38.74:443
190.74.239.37:2222
72.252.157.172:990
79.129.121.68:995
37.186.54.254:995
120.150.218.241:995
24.178.196.158:2222
91.177.173.10:995
176.67.56.94:443
31.35.28.29:443
24.139.72.117:443
217.128.122.65:2222
148.0.57.85:443
100.1.108.246:443
37.210.160.58:2222
103.107.113.120:443
86.98.208.214:2222
63.143.92.99:995
186.64.67.8:443
72.12.115.71:22
172.114.160.81:995
187.102.135.142:2222
80.11.74.81:2222
179.99.49.37:32101
104.34.212.7:32103
172.115.177.204:2222
208.107.221.224:443
74.14.7.71:2222
40.134.246.185:995
24.152.219.253:995
46.107.48.202:443
196.203.37.215:80
93.48.80.198:995
24.55.67.176:443
172.114.160.81:443
70.51.153.227:2222
32.221.224.140:995
118.172.250.162:443
103.246.242.202:443
72.76.94.99:443
197.89.108.36:443
39.44.144.64:995
94.36.195.250:2222
103.116.178.85:995
39.49.107.255:995
117.248.109.38:21
103.88.226.30:443
203.122.46.130:443
103.139.243.207:993
39.33.211.246:995
182.191.92.203:995
92.132.172.197:2222
1.161.104.149:443
1.161.104.149:995
180.129.20.164:995
46.176.222.34:995
69.14.172.24:443
175.145.235.37:443
39.57.111.109:995
102.182.232.3:995
83.79.89.141:2222
121.7.223.59:2222
83.110.218.155:993
113.89.5.252:995
76.25.142.196:443
39.52.12.84:993
121.74.167.191:995
39.52.12.84:995
173.21.10.71:2222
73.67.152.98:2222
45.46.53.140:2222
5.32.41.45:443
73.151.236.31:443
201.172.23.68:2222
37.34.253.233:443
156.219.10.43:995
217.164.117.87:1194
103.139.243.207:990
71.13.93.154:2222
89.86.33.217:443
109.12.111.14:443
217.164.210.192:443
41.84.234.161:995
191.112.14.1:443
78.180.88.120:443
105.99.166.175:443
45.241.145.100:995
197.161.54.85:993
31.215.98.103:443
191.250.245.193:443
217.164.117.87:2222
83.110.94.89:443
180.183.102.114:2222
187.189.173.181:443
174.95.174.163:2222
120.61.3.142:443
84.241.8.23:32103
85.246.82.244:443
39.41.155.156:995
98.22.246.169:443
189.243.13.151:443
167.86.165.74:443
82.41.63.217:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5116 3364 WerFault.exe 22 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3364 2748 rundll32.exe 22 PID 2748 wrote to memory of 3364 2748 rundll32.exe 22 PID 2748 wrote to memory of 3364 2748 rundll32.exe 22
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3eb42abc461cd5cc26bc87a8e7c93ec1eaa46b40c15a55b94b7c76b48cf0b0a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a3eb42abc461cd5cc26bc87a8e7c93ec1eaa46b40c15a55b94b7c76b48cf0b0a.dll,#12⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 6683⤵
- Program crash
PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3364 -ip 33641⤵PID:3752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4100 --field-trial-handle=3044,i,17059189006398306756,4247826696353232857,262144 --variations-seed-version /prefetch:81⤵PID:3772