Overview
overview
10Static
static
33763170476...92.exe
windows10-2004-x64
10a00f993805...f5.exe
windows10-2004-x64
6a27aa292f9...96.exe
windows10-2004-x64
10a3960e88c7...c6.exe
windows10-2004-x64
8b1adee00a1...f4.exe
windows10-2004-x64
10b9c037384e...e3.exe
windows10-2004-x64
10c0592acd47...d2.exe
windows10-2004-x64
1c14987c4c6...03.exe
windows10-2004-x64
10c203192bf3...c1.exe
windows10-2004-x64
3cf2652dc2a...c4.dll
windows10-2004-x64
10d2ba18358b...17.exe
windows10-2004-x64
3d6b7cb431b...74.exe
windows10-2004-x64
8db246897a0...b0.exe
windows10-2004-x64
3df16940f38...e0.exe
windows10-2004-x64
10e39833949c...ab.exe
windows10-2004-x64
10e98170984c...66.dll
windows10-2004-x64
1ea2a2d0b59...cd.exe
windows10-2004-x64
10eaffdf51b1...f1.exe
windows10-2004-x64
10eda6bb813c...f9.exe
windows10-2004-x64
10f4f625c6ec...fc.exe
windows10-2004-x64
10f72762cd37...ac.exe
windows10-2004-x64
10fce3d69b9c...e2.exe
windows10-2004-x64
3Analysis
-
max time kernel
139s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
3763170476b8a4c3cb592cbea6c4471ba2ea2463db9f7839fda502ef0a06b092.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
a00f9938052cd7987d8740671ba12f61cde995601edb75b63d7347e48b552bf5.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
a27aa292f9978f85dd0fcf599491efea6abf80223d4ce4baaf56789f870c9196.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral4
Sample
a3960e88c72a663734c17d85f5015571b340789d3a9646aa71a8d7ded643a7c6.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
b1adee00a132b96a6f457031953b01fd1e322c57bff3fc9517b7d92d1ba884f4.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral6
Sample
b9c037384eaa82706baf7c3cd5e1550fe9ad24083edeb00e55d9da8198ea6ee3.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
c0592acd4714d89c4f9e10ef0b2a9b4a7f0a445f24fb5212781fd47ca7d34dd2.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral8
Sample
c14987c4c6fc2de2cac43355964465d7611652e29f699d64fa292399f526c103.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
c203192bf329f099fddebfc57a7a258b974550e0b51a81115c9980aff02fe6c1.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral10
Sample
cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
d2ba18358b1edbac5cdb875761367ce6f88ef0e61d749357a259988d15d1bc17.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral12
Sample
d6b7cb431b16723bce5523e0ac0c99fe0e583afaf1154f51cffee7420fe4dd74.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
db246897a0efe3c4b3cd4b9f832067815fa920045e9a5a3d0881dc9ffd958fb0.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral14
Sample
df16940f38135c9dfa808b7f19348339deca912fe54331b2dd739decdf37d9e0.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
e39833949c41ebb2bcc53a374f17491536b1dda70e53700b19fa53f04bf695ab.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral16
Sample
e98170984c87aa1b92df230ef020557cad5afa4cf6815f7cbd764a70a1323b66.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
ea2a2d0b594f527f391abdf595d5f93424d9121dc292ff458362bff765bff2cd.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral18
Sample
eaffdf51b17ef1b7b7bf01ab6e8c2dce61a3dbd875b368e06a6d3b95e100c6f1.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
eda6bb813cee36866a58cc01b6c928484e8751e3c442ec9739f798aeb8e453f9.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral20
Sample
f4f625c6ec130389122077c9650b1c195a7793a173a621416cea8622c14405fc.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
f72762cd37962e6fc7a65ae4c414589694aef8794e6d1fa8060f270f069bf1ac.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral22
Sample
fce3d69b9c65945dcfbb74155f2186626f2ab404e38117f2222762361d7af6e2.exe
Resource
win10v2004-20240730-en
General
-
Target
cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll
-
Size
327KB
-
MD5
296474dfc42b6c053f354be7e1be151e
-
SHA1
138ad810a0dfc8216ea5f71b1d2e00f667dc3b16
-
SHA256
cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4
-
SHA512
d7750203a565bdb6f11b52aaee117e662f1ae0bd2ef505537a04cdd5b6a39a222f3f3591bf879809acd082527bc291cb139ec37a41355228bafb1502830308a3
-
SSDEEP
6144:R60vBQcV0PPspp3Ke/QVCY9/Ob9ho+JVxfTPAKxu9755fu2v4ibqXtWXC1:R7A8TJPNPp84NibIt1
Malware Config
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Pwiapfq = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Gapliu = "0" reg.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\53db48bb = cb703c452af649e2c4140d67a7a98e8c649771314265ce explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\a1b19066 = 7f2183f03a83e29811f94b1812af46d249b4cac5d5e9cd55c3e102ecd34c7b4ddb8787005eb23080cdab6ea8a96be51fdbf53e41d68681292b93b303015921c3894abd57303358b2673506b9200a61a2f2bd31d135e0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\def8ff90 = 466f727dd93a96a20391d7d5865c4fee367e01107e09eccb226415b8d746dcd19bb62bef238abdf7792264d2c2c6b866e9e4d809038cdfabf884542402dd14944c0bed533482cf9d9c6f explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\eb672fde = 009d7e2668a20b3928e96a0a91efa3ac17556b84eceb2dc2704e9dec50250e3d7b9ba2d24d0c56c20c13ed6a499956898270fc23df9bd92d88a5bc6ab58efe0149ed4f3c1c10db7183f079a1cfa4b297fdbc9b772a1539bfad6916664dd0fc110f9ae99aa5738480d0 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\2c92274d = 46841270dc9d7908742871e4f1c9d34a7fbb5346ee9b07a3a2b931b583e96e11c2423da404ade2372a73204ea94e2f80c48ab50efb1f9c028009b9ac16330e1dd65a70f22f0f06ece6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\942e4028 = 3e224be185b23d745e5a73ab6bb1464373d1eb731353c97a5c1aa7cd06df3cfb3f6d35032f262fee7bf1c54a8d51dec6204346f92794a0c2139f15508be429991bb172 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\def8ff90 = 466f657dd93aa365f89f3b47cfbc1b0c967943fa6277f38f54891e7568768dda6ab628ef724bd95a996c176f90c02f9df94a800818 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\e9260fa2 = 23d741c260116d610f96fd43fc9c7b7d32c6faf363c3630eb327448bbdc2a8d038a92c32e62b4be749de437c7d076d20379b1237d0297c921767bec4a8308bcdb6203791435cd9e5b4f92cb537c29c326e972c76caffce22 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Hosczaabukzo\519a68c7 = 2dbdd9d544d619e0bf2bc9d50d3fad6d26 explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4960 regsvr32.exe 4960 regsvr32.exe 2380 regsvr32.exe 2380 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4960 regsvr32.exe 2380 regsvr32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4960 2396 regsvr32.exe 84 PID 2396 wrote to memory of 4960 2396 regsvr32.exe 84 PID 2396 wrote to memory of 4960 2396 regsvr32.exe 84 PID 4960 wrote to memory of 3860 4960 regsvr32.exe 86 PID 4960 wrote to memory of 3860 4960 regsvr32.exe 86 PID 4960 wrote to memory of 3860 4960 regsvr32.exe 86 PID 4960 wrote to memory of 3860 4960 regsvr32.exe 86 PID 4960 wrote to memory of 3860 4960 regsvr32.exe 86 PID 3860 wrote to memory of 1032 3860 explorer.exe 87 PID 3860 wrote to memory of 1032 3860 explorer.exe 87 PID 3860 wrote to memory of 1032 3860 explorer.exe 87 PID 3292 wrote to memory of 2380 3292 regsvr32.exe 93 PID 3292 wrote to memory of 2380 3292 regsvr32.exe 93 PID 3292 wrote to memory of 2380 3292 regsvr32.exe 93 PID 2380 wrote to memory of 3792 2380 regsvr32.exe 94 PID 2380 wrote to memory of 3792 2380 regsvr32.exe 94 PID 2380 wrote to memory of 3792 2380 regsvr32.exe 94 PID 2380 wrote to memory of 3792 2380 regsvr32.exe 94 PID 2380 wrote to memory of 3792 2380 regsvr32.exe 94 PID 3792 wrote to memory of 3872 3792 explorer.exe 95 PID 3792 wrote to memory of 3872 3792 explorer.exe 95 PID 3792 wrote to memory of 2988 3792 explorer.exe 97 PID 3792 wrote to memory of 2988 3792 explorer.exe 97
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn syikfkn /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll\"" /SC ONCE /Z /ST 10:56 /ET 11:084⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1032
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Pwiapfq" /d "0"4⤵
- Windows security bypass
PID:3872
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Gapliu" /d "0"4⤵
- Windows security bypass
PID:2988
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4.dll
Filesize327KB
MD5296474dfc42b6c053f354be7e1be151e
SHA1138ad810a0dfc8216ea5f71b1d2e00f667dc3b16
SHA256cf2652dc2a844f6aa436149211ea57e54102ce3ebd808eded619298c0bb16cc4
SHA512d7750203a565bdb6f11b52aaee117e662f1ae0bd2ef505537a04cdd5b6a39a222f3f3591bf879809acd082527bc291cb139ec37a41355228bafb1502830308a3