Resubmissions
20-03-2024 20:50
240320-zmt8naag35 1013-10-2022 11:50
221013-nzp9pache4 1001-10-2022 01:58
221001-cd4peagcfn 10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
LearnS.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
assaulting/baronessSubsided.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
assaulting/milt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
assaulting/testifiersEquivalently.cmd
Resource
win10v2004-20240226-en
General
-
Target
assaulting/milt.dll
-
Size
448KB
-
MD5
24c89f5383c6dca654f27383b1ec00a3
-
SHA1
7766a0a045e56fe16fb5b9e0c5d7c1d047eb36c6
-
SHA256
bb2540e27de2b8d3d154fee3efa8e2cbefdf25e5a1d76b4cedf49ac3917a1471
-
SHA512
58bffa71d6be31e136c220828ba0565a7e9231e363804beefc66f47653cf80af94bcc5c221444e6f7f1707dbe915279d67c77592ccedc2d5f09b29bc62f39eb3
-
SSDEEP
6144:NWlZhgoMdtBYTNSlWBsAOvbd62IYQ8jjHH62uzdMzD9699o9:cl3goMdrbdJ6wQ8faVO099o
Malware Config
Extracted
qakbot
403.902
BB
1664535088
41.107.71.201:443
105.101.230.16:443
105.108.239.60:443
196.64.227.5:8443
41.249.158.221:995
134.35.14.5:443
113.170.117.251:443
187.193.219.248:443
122.166.244.116:443
154.237.129.123:995
41.98.229.81:443
186.48.199.243:995
102.156.3.13:443
41.97.190.189:443
197.207.191.164:443
105.184.14.132:995
196.207.146.151:443
105.158.113.15:443
196.89.42.89:995
86.98.156.229:993
177.174.119.195:32101
81.156.194.147:2078
80.253.189.55:443
197.49.175.67:995
177.45.78.52:993
89.187.169.77:443
196.92.59.242:995
41.13.200.19:443
41.97.195.237:443
92.191.56.11:2222
154.70.53.202:443
210.186.37.98:50002
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exewermgr.exepid process 2696 regsvr32.exe 2696 regsvr32.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe 1816 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 2696 regsvr32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 3956 wrote to memory of 2696 3956 regsvr32.exe regsvr32.exe PID 3956 wrote to memory of 2696 3956 regsvr32.exe regsvr32.exe PID 3956 wrote to memory of 2696 3956 regsvr32.exe regsvr32.exe PID 2696 wrote to memory of 1816 2696 regsvr32.exe wermgr.exe PID 2696 wrote to memory of 1816 2696 regsvr32.exe wermgr.exe PID 2696 wrote to memory of 1816 2696 regsvr32.exe wermgr.exe PID 2696 wrote to memory of 1816 2696 regsvr32.exe wermgr.exe PID 2696 wrote to memory of 1816 2696 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\assaulting\milt.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\assaulting\milt.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-