Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
22e2bcca5afd5e52dd8c3f38733f0536.dll
Resource
win7-20240221-en
General
-
Target
22e2bcca5afd5e52dd8c3f38733f0536.dll
-
Size
2.0MB
-
MD5
22e2bcca5afd5e52dd8c3f38733f0536
-
SHA1
daa357db2376cd8bacf90ec54d463ae01285a0d7
-
SHA256
ebc65a0de1181cf74562042be9a2c87fadc0e3982fb5c15d27a58570ed155746
-
SHA512
a657978d60524ffae6635a946b534c2c9001035d54ca0d1ed53cd9e3c5abbcdd93b65dd9f1c947fb3de32ee9286f766b5cf971ac337dc3d4bca0a6508fd35d49
-
SSDEEP
3072:RrUbfrh/TP/lpDbIqUKQ0yzMrPye1TMhj4fujyaVzm28NaU:ybFLP/bXHUFzAae1bujL9d8Nd
Malware Config
Extracted
qakbot
401.72
abc109
1607499808
37.210.255.225:443
83.110.13.182:2222
74.75.237.11:443
5.193.106.230:2078
86.125.205.97:443
58.152.9.133:443
83.110.221.218:443
178.87.49.9:443
217.128.117.218:2222
78.63.226.32:443
85.204.189.105:443
217.133.54.140:32100
87.27.110.90:2222
90.23.117.67:2222
94.69.242.254:2222
72.182.209.97:2222
89.137.211.239:443
197.45.110.165:995
105.198.236.99:443
39.32.72.187:995
103.76.160.110:443
103.102.100.78:2222
79.114.166.171:2222
185.246.9.69:995
116.240.78.45:995
117.215.195.188:443
212.70.107.59:995
37.21.231.245:995
45.250.69.150:443
2.133.215.76:995
189.132.16.126:443
121.50.153.66:995
92.59.35.196:2083
109.205.204.229:2222
98.16.204.189:995
2.89.122.180:995
83.110.158.22:2222
91.138.177.114:2222
24.37.178.158:443
185.105.131.233:443
79.101.206.250:995
149.28.101.90:2222
47.44.217.98:443
122.59.40.31:995
136.232.34.70:443
2.89.122.180:993
39.36.225.15:995
86.97.190.30:443
89.137.77.237:443
78.187.125.116:2222
86.121.43.200:443
47.22.148.6:995
91.104.235.91:995
81.97.154.100:443
2.88.246.223:443
94.52.68.72:443
155.186.9.160:443
161.199.180.159:443
78.189.29.95:443
31.5.21.66:995
86.121.3.80:443
110.159.80.243:443
37.106.117.51:443
80.14.22.234:2222
2.7.202.106:2222
46.124.106.217:6881
80.227.5.70:443
184.21.136.237:995
93.113.177.152:443
160.3.184.253:443
161.142.217.62:443
80.195.103.146:2222
174.62.13.151:443
95.76.27.6:443
85.105.29.218:443
2.50.47.61:2078
5.193.177.247:2078
197.86.204.201:443
72.36.59.46:2222
74.124.191.6:443
197.36.100.188:995
149.28.101.90:8443
74.128.121.17:443
219.74.176.225:443
74.195.52.3:443
50.244.112.10:995
125.63.101.62:443
79.113.3.236:443
197.210.96.222:995
195.97.101.40:443
182.161.6.57:3389
173.21.10.71:2222
219.76.148.249:443
41.39.134.183:443
79.129.252.62:2222
108.30.125.94:443
78.101.158.1:61201
24.201.61.153:2078
2.50.2.216:443
76.104.230.174:443
78.162.70.119:443
81.214.126.173:2222
83.196.50.197:2222
172.87.157.235:3389
151.61.107.248:2222
47.208.8.187:443
50.244.112.90:443
87.218.53.206:2222
75.136.40.155:443
96.225.88.23:443
103.110.6.151:2087
83.110.151.105:443
2.50.0.222:995
73.200.219.143:443
79.113.119.125:443
2.51.240.250:995
24.40.173.134:443
59.89.129.103:443
202.141.244.118:993
217.165.3.30:443
81.150.181.168:2222
184.98.97.227:995
35.134.202.234:443
37.211.93.46:443
2.50.159.196:2222
149.28.101.90:443
68.225.60.77:995
109.154.193.21:2222
67.141.11.98:443
37.116.152.122:2078
96.40.175.33:443
173.173.1.164:443
2.90.124.155:995
24.179.13.119:443
120.150.218.241:443
83.114.243.80:2222
2.50.56.81:443
47.21.192.182:2222
77.211.30.202:995
93.146.133.102:2222
96.21.251.127:2222
71.74.12.34:443
58.179.21.147:995
98.124.76.187:443
203.106.195.67:443
86.99.134.235:2222
174.87.65.179:443
216.201.162.158:443
120.150.34.178:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4484 regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4056 4484 WerFault.exe 102 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3588 rundll32.exe 3588 rundll32.exe 3588 rundll32.exe 3588 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3588 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3588 2996 rundll32.exe 87 PID 2996 wrote to memory of 3588 2996 rundll32.exe 87 PID 2996 wrote to memory of 3588 2996 rundll32.exe 87 PID 3588 wrote to memory of 3292 3588 rundll32.exe 93 PID 3588 wrote to memory of 3292 3588 rundll32.exe 93 PID 3588 wrote to memory of 3292 3588 rundll32.exe 93 PID 3588 wrote to memory of 3292 3588 rundll32.exe 93 PID 3588 wrote to memory of 3292 3588 rundll32.exe 93 PID 3292 wrote to memory of 4556 3292 explorer.exe 94 PID 3292 wrote to memory of 4556 3292 explorer.exe 94 PID 3292 wrote to memory of 4556 3292 explorer.exe 94 PID 4700 wrote to memory of 4484 4700 regsvr32.exe 102 PID 4700 wrote to memory of 4484 4700 regsvr32.exe 102 PID 4700 wrote to memory of 4484 4700 regsvr32.exe 102
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll,#12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn eajweqw /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll\"" /SC ONCE /Z /ST 16:19 /ET 16:314⤵
- Creates scheduled task(s)
PID:4556
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\22e2bcca5afd5e52dd8c3f38733f0536.dll"2⤵
- Loads dropped DLL
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 5843⤵
- Program crash
PID:4056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4484 -ip 44841⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5e1789b42dce9f998c860c680058c0122
SHA131341ebc0fe77d0a3dec77dad35c6cd7885adbdb
SHA256b08ca3c948d7ee738457a34d9d176bc571fdd182688ebe62e1690b4e9bca6bec
SHA51228df4e8869ebe81ee0253753435b03db9c8f60eb09c9077cb572c14eeda7a2f9814f980bd52022853b050aa626d8973d75d28c6141e1e18d8447c733a7db53ad