Analysis
-
max time kernel
125s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
22e2bcca5afd5e52dd8c3f38733f0536.dll
Resource
win7-20240221-en
General
-
Target
22e2bcca5afd5e52dd8c3f38733f0536.dll
-
Size
2.0MB
-
MD5
22e2bcca5afd5e52dd8c3f38733f0536
-
SHA1
daa357db2376cd8bacf90ec54d463ae01285a0d7
-
SHA256
ebc65a0de1181cf74562042be9a2c87fadc0e3982fb5c15d27a58570ed155746
-
SHA512
a657978d60524ffae6635a946b534c2c9001035d54ca0d1ed53cd9e3c5abbcdd93b65dd9f1c947fb3de32ee9286f766b5cf971ac337dc3d4bca0a6508fd35d49
-
SSDEEP
3072:RrUbfrh/TP/lpDbIqUKQ0yzMrPye1TMhj4fujyaVzm28NaU:ybFLP/bXHUFzAae1bujL9d8Nd
Malware Config
Extracted
qakbot
401.72
abc109
1607499808
37.210.255.225:443
83.110.13.182:2222
74.75.237.11:443
5.193.106.230:2078
86.125.205.97:443
58.152.9.133:443
83.110.221.218:443
178.87.49.9:443
217.128.117.218:2222
78.63.226.32:443
85.204.189.105:443
217.133.54.140:32100
87.27.110.90:2222
90.23.117.67:2222
94.69.242.254:2222
72.182.209.97:2222
89.137.211.239:443
197.45.110.165:995
105.198.236.99:443
39.32.72.187:995
103.76.160.110:443
103.102.100.78:2222
79.114.166.171:2222
185.246.9.69:995
116.240.78.45:995
117.215.195.188:443
212.70.107.59:995
37.21.231.245:995
45.250.69.150:443
2.133.215.76:995
189.132.16.126:443
121.50.153.66:995
92.59.35.196:2083
109.205.204.229:2222
98.16.204.189:995
2.89.122.180:995
83.110.158.22:2222
91.138.177.114:2222
24.37.178.158:443
185.105.131.233:443
79.101.206.250:995
149.28.101.90:2222
47.44.217.98:443
122.59.40.31:995
136.232.34.70:443
2.89.122.180:993
39.36.225.15:995
86.97.190.30:443
89.137.77.237:443
78.187.125.116:2222
86.121.43.200:443
47.22.148.6:995
91.104.235.91:995
81.97.154.100:443
2.88.246.223:443
94.52.68.72:443
155.186.9.160:443
161.199.180.159:443
78.189.29.95:443
31.5.21.66:995
86.121.3.80:443
110.159.80.243:443
37.106.117.51:443
80.14.22.234:2222
2.7.202.106:2222
46.124.106.217:6881
80.227.5.70:443
184.21.136.237:995
93.113.177.152:443
160.3.184.253:443
161.142.217.62:443
80.195.103.146:2222
174.62.13.151:443
95.76.27.6:443
85.105.29.218:443
2.50.47.61:2078
5.193.177.247:2078
197.86.204.201:443
72.36.59.46:2222
74.124.191.6:443
197.36.100.188:995
149.28.101.90:8443
74.128.121.17:443
219.74.176.225:443
74.195.52.3:443
50.244.112.10:995
125.63.101.62:443
79.113.3.236:443
197.210.96.222:995
195.97.101.40:443
182.161.6.57:3389
173.21.10.71:2222
219.76.148.249:443
41.39.134.183:443
79.129.252.62:2222
108.30.125.94:443
78.101.158.1:61201
24.201.61.153:2078
2.50.2.216:443
76.104.230.174:443
78.162.70.119:443
81.214.126.173:2222
83.196.50.197:2222
172.87.157.235:3389
151.61.107.248:2222
47.208.8.187:443
50.244.112.90:443
87.218.53.206:2222
75.136.40.155:443
96.225.88.23:443
103.110.6.151:2087
83.110.151.105:443
2.50.0.222:995
73.200.219.143:443
79.113.119.125:443
2.51.240.250:995
24.40.173.134:443
59.89.129.103:443
202.141.244.118:993
217.165.3.30:443
81.150.181.168:2222
184.98.97.227:995
35.134.202.234:443
37.211.93.46:443
2.50.159.196:2222
149.28.101.90:443
68.225.60.77:995
109.154.193.21:2222
67.141.11.98:443
37.116.152.122:2078
96.40.175.33:443
173.173.1.164:443
2.90.124.155:995
24.179.13.119:443
120.150.218.241:443
83.114.243.80:2222
2.50.56.81:443
47.21.192.182:2222
77.211.30.202:995
93.146.133.102:2222
96.21.251.127:2222
71.74.12.34:443
58.179.21.147:995
98.124.76.187:443
203.106.195.67:443
86.99.134.235:2222
174.87.65.179:443
216.201.162.158:443
120.150.34.178:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 1508 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid Process 1708 rundll32.exe 1708 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rundll32.exepid Process 1708 rundll32.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exetaskeng.exeregsvr32.exedescription pid Process procid_target PID 2172 wrote to memory of 1708 2172 rundll32.exe 28 PID 2172 wrote to memory of 1708 2172 rundll32.exe 28 PID 2172 wrote to memory of 1708 2172 rundll32.exe 28 PID 2172 wrote to memory of 1708 2172 rundll32.exe 28 PID 2172 wrote to memory of 1708 2172 rundll32.exe 28 PID 2172 wrote to memory of 1708 2172 rundll32.exe 28 PID 2172 wrote to memory of 1708 2172 rundll32.exe 28 PID 1708 wrote to memory of 1032 1708 rundll32.exe 29 PID 1708 wrote to memory of 1032 1708 rundll32.exe 29 PID 1708 wrote to memory of 1032 1708 rundll32.exe 29 PID 1708 wrote to memory of 1032 1708 rundll32.exe 29 PID 1708 wrote to memory of 1032 1708 rundll32.exe 29 PID 1708 wrote to memory of 1032 1708 rundll32.exe 29 PID 1032 wrote to memory of 2628 1032 explorer.exe 30 PID 1032 wrote to memory of 2628 1032 explorer.exe 30 PID 1032 wrote to memory of 2628 1032 explorer.exe 30 PID 1032 wrote to memory of 2628 1032 explorer.exe 30 PID 2132 wrote to memory of 1552 2132 taskeng.exe 35 PID 2132 wrote to memory of 1552 2132 taskeng.exe 35 PID 2132 wrote to memory of 1552 2132 taskeng.exe 35 PID 2132 wrote to memory of 1552 2132 taskeng.exe 35 PID 2132 wrote to memory of 1552 2132 taskeng.exe 35 PID 1552 wrote to memory of 1508 1552 regsvr32.exe 36 PID 1552 wrote to memory of 1508 1552 regsvr32.exe 36 PID 1552 wrote to memory of 1508 1552 regsvr32.exe 36 PID 1552 wrote to memory of 1508 1552 regsvr32.exe 36 PID 1552 wrote to memory of 1508 1552 regsvr32.exe 36 PID 1552 wrote to memory of 1508 1552 regsvr32.exe 36 PID 1552 wrote to memory of 1508 1552 regsvr32.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn jadymzuf /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll\"" /SC ONCE /Z /ST 16:19 /ET 16:314⤵
- Creates scheduled task(s)
PID:2628
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {871C217F-DC11-46E6-8419-4784CE793BEF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll"3⤵
- Loads dropped DLL
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5e1789b42dce9f998c860c680058c0122
SHA131341ebc0fe77d0a3dec77dad35c6cd7885adbdb
SHA256b08ca3c948d7ee738457a34d9d176bc571fdd182688ebe62e1690b4e9bca6bec
SHA51228df4e8869ebe81ee0253753435b03db9c8f60eb09c9077cb572c14eeda7a2f9814f980bd52022853b050aa626d8973d75d28c6141e1e18d8447c733a7db53ad