Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
a5bc0cd5d00f106956ae962aaddf631a4fc5fc4da24b36fa2518d1a9700a6f63.dll
Resource
win7-20240221-en
General
-
Target
a5bc0cd5d00f106956ae962aaddf631a4fc5fc4da24b36fa2518d1a9700a6f63.dll
-
Size
875KB
-
MD5
35a7ed73981b4608879a56617e05d1e4
-
SHA1
aa05bdd339e484d3e701084a069ffebc7a5c534d
-
SHA256
a5bc0cd5d00f106956ae962aaddf631a4fc5fc4da24b36fa2518d1a9700a6f63
-
SHA512
4d38ffda1c385d08c4e581597fb5813fa8fe41570418793b5df6ed1e882c97187f127ef3947ea45fb0bb2ac3a0ca32d37151004b1c64168808641c465d80c559
-
SSDEEP
12288:MvdyMlRePlWuktyda+/egKRuCQ1X8eLQRNGoDTStoMsaD2F1PrIGCn:GnlRxuwTI4BqMeGNruaVa6FZCn
Malware Config
Extracted
qakbot
403.549
AA
1648462350
75.113.214.234:2222
86.98.208.214:2222
41.84.229.218:995
190.73.3.148:2222
113.11.89.170:995
45.241.152.155:993
74.15.2.252:2222
76.70.9.169:2222
103.139.242.30:993
80.11.74.81:2222
105.186.127.127:995
81.60.217.44:995
79.129.121.68:995
75.99.168.194:443
5.95.58.211:2087
129.208.19.253:995
2.34.12.8:443
108.60.213.141:443
176.67.56.94:443
176.88.238.122:995
140.82.49.12:443
93.48.80.198:995
1.161.126.13:443
148.64.96.100:443
47.180.172.159:443
47.23.89.62:995
119.158.111.142:995
76.169.147.192:32103
191.205.7.5:32101
96.21.251.127:2222
24.43.99.75:443
41.228.22.180:443
78.188.76.167:443
37.186.54.166:995
83.110.85.209:443
173.174.216.62:443
5.54.87.251:995
197.244.119.149:443
92.177.45.46:2078
70.57.207.83:443
31.215.185.59:1194
47.23.89.62:993
72.76.94.99:443
180.183.128.80:2222
112.199.148.55:995
109.12.111.14:443
75.99.168.194:61201
45.9.20.200:443
45.76.167.26:995
140.82.63.183:995
140.82.63.183:443
45.63.1.12:443
149.28.238.199:995
149.28.238.199:443
144.202.2.175:443
45.63.1.12:995
45.76.167.26:443
144.202.3.39:995
144.202.2.175:995
144.202.3.39:443
32.221.225.247:995
180.233.150.134:995
87.139.163.216:995
148.64.96.100:993
1.161.126.13:995
71.13.93.154:2222
83.110.85.209:995
86.98.27.253:443
31.35.28.29:443
207.170.238.231:443
209.180.70.25:443
174.69.215.101:443
39.52.124.42:995
172.115.177.204:2222
39.57.23.5:995
70.46.220.114:443
186.64.67.46:443
203.122.46.130:443
81.132.186.248:2078
91.177.173.10:995
114.79.148.170:443
85.1.164.37:2222
24.178.196.158:2222
67.209.195.198:443
37.152.80.105:443
172.114.160.81:995
103.116.178.85:443
39.44.144.159:995
200.58.84.99:443
217.165.146.136:993
117.248.109.38:21
45.241.228.188:995
2.42.176.91:443
24.152.219.253:995
195.32.57.18:80
217.128.122.65:2222
31.215.185.59:2222
87.17.45.67:50001
78.101.91.50:2222
120.61.1.33:443
82.152.39.39:443
38.70.253.226:2222
120.150.218.241:995
103.230.180.119:443
182.191.92.203:995
103.88.226.30:443
86.195.158.178:2222
82.84.66.211:2222
101.190.95.16:2222
208.107.221.224:443
103.233.141.164:2222
121.74.182.236:995
76.25.142.196:443
173.21.10.71:2222
45.46.53.140:2222
76.23.237.163:995
41.13.146.184:443
73.151.236.31:443
102.65.38.90:443
68.204.7.158:443
161.142.56.8:443
5.32.41.45:443
67.165.206.193:993
90.120.65.153:2078
191.99.191.28:443
71.74.12.34:443
86.220.150.192:2222
94.36.190.252:2222
37.211.176.26:61202
189.146.51.56:443
143.0.34.185:443
177.97.48.132:443
75.188.35.168:443
63.143.92.99:995
86.180.31.38:443
76.69.155.202:2222
189.176.190.162:443
47.180.172.159:50010
72.12.115.90:22
189.237.58.13:443
89.137.52.44:443
187.195.98.155:443
70.51.132.235:2222
186.106.197.52:443
47.158.25.67:443
179.158.105.44:443
39.33.197.68:995
217.165.84.216:32101
31.215.69.127:443
201.145.226.223:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 740 1132 WerFault.exe 42 -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4960 wrote to memory of 1132 4960 rundll32.exe 42 PID 4960 wrote to memory of 1132 4960 rundll32.exe 42 PID 4960 wrote to memory of 1132 4960 rundll32.exe 42
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5bc0cd5d00f106956ae962aaddf631a4fc5fc4da24b36fa2518d1a9700a6f63.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5bc0cd5d00f106956ae962aaddf631a4fc5fc4da24b36fa2518d1a9700a6f63.dll,#12⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 6683⤵
- Program crash
PID:740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1132 -ip 11321⤵PID:3992