Overview
overview
10Static
static
100297bbb0f0...ee.exe
windows10-1703-x64
315aeb8380c...71.exe
windows10-1703-x64
101820a0542f...34.dll
windows10-1703-x64
101df11bc19a...ad.exe
windows10-1703-x64
722934e006b...e7.exe
windows10-1703-x64
324989d884f...b7.exe
windows10-1703-x64
102828fabf39...65.dll
windows10-1703-x64
132b0fbaf95...08.exe
windows10-1703-x64
104bf2dace8a...d7.exe
windows10-1703-x64
1055d03f9954...44.dll
windows10-1703-x64
105e58e3818a...cb.exe
windows10-1703-x64
10611cf2be67...47.exe
windows10-1703-x64
10654e574fb4...01.exe
windows10-1703-x64
36f4ac0da34...a5.exe
windows10-1703-x64
9$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDIR/UAC.dll
windows10-1703-x64
3$PLUGINSDI...fo.dll
windows10-1703-x64
3$PLUGINSDI...gs.dll
windows10-1703-x64
3$PROGRAMFI...it.dll
windows10-1703-x64
3$PROGRAMFI...ge.dll
windows10-1703-x64
3$PROGRAMFI...er.dll
windows10-1703-x64
37109e67cf6...58.exe
windows10-1703-x64
1071e2483b2d...4e.dll
windows10-1703-x64
1079fb1d00ef...00.exe
windows10-1703-x64
17ef9667e73...98.exe
windows10-1703-x64
18264e723a4...9d.exe
windows10-1703-x64
38427f4aaf2...96.exe
windows10-1703-x64
6863c612734...af.exe
windows10-1703-x64
391eab57eaf...d8.exe
windows10-1703-x64
10942263c895...38.exe
windows10-1703-x64
1095193266e3...fc.exe
windows10-1703-x64
199db2e7287...4e.exe
windows10-1703-x64
10Resubmissions
04-10-2024 16:44
241004-t8yv3syhpd 1027-09-2024 16:54
240927-vepkzsvbre 1027-09-2024 16:44
240927-t86wpavard 1004-08-2024 18:04
240804-wnq1vawbpg 1003-08-2024 17:26
240803-vzvbzazekn 1003-08-2024 16:14
240803-tpp4tsshqa 1003-08-2024 15:52
240803-tbarzsseqc 1031-07-2024 19:40
240731-ydk3yszdpq 1031-07-2024 10:53
240731-my145atfmf 10Analysis
-
max time kernel
748s -
max time network
753s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
31-07-2024 19:40
Behavioral task
behavioral1
Sample
0297bbb0f00b3f591894ebcf042f2c6b0ed52e6662def1a9dbca0f8d20133cee.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
15aeb8380c7b5b50ed1e2ff29c342cfe5c29a26554020001f7f9f1449f996e71.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
1820a0542f5950fd92ffa787cf09377a14d0fb42f0fa7419366090a5771a5f34.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
1df11bc19aa52b623bdf15380e3fded56d8eb6fb7b53a2240779864b1a6474ad.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
22934e006b3f1b8225c51a93ce0acaa1874c4f1dc895fa1664bdf16b0065d2e7.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
24989d884f480964f0cfd5d5ed0cf785b6b97843779051ab12c6c17beabb15b7.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
2828fabf3937d88b85183664c9019c4639776ba7c2322f48e4957108ef07ed65.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
32b0fbaf95fefcc9b89243be8721625592fc9ed92d76a48cab263898fd3d5c08.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
4bf2dace8a23551a3cd374a14b68cef6185aa18f9148dac8bf77f19f734d3ad7.exe
Resource
win10-20240611-en
Behavioral task
behavioral10
Sample
55d03f9954e35d8bce3fbd084d909744b3719310bac7c359cda87e7831cc1344.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
5e58e3818a1b7a5c46fab0a1400f7ccd88f088a782bb9c9f229f5e835e57aecb.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
611cf2be6752c173be1328ea47cc8ea736bc3bda9030da617390b23afa955b47.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
654e574fb479af0a9f8d277ed12f2d86681b76b4cfe63d7c9e774f5144be8801.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
6f4ac0da343abb9dd25d7a27c302a6ab29ed9e7c49123b3c8200138abd3eaea5.exe
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240611-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/UAC.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10-20240611-en
Behavioral task
behavioral22
Sample
7109e67cf655b41ff88903bf1e70cc4efa3e537a38df7df90d8a3ff95c4cab58.exe
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
79fb1d00ef9d85e958a17fd331b23dec507e4f2e2c150fd580d0668b84d29d00.exe
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
7ef9667e73b84b6a031e28b6279e04cd8abe82d69cd836043a7cfe0978cb8a98.exe
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
8264e723a411381a9d837458ec39cbb36c8d582bcba14f7ed7fc45f8154c479d.exe
Resource
win10-20240611-en
Behavioral task
behavioral27
Sample
8427f4aaf255d36cf523ecd34f3023e23cb0ad1d5edacc5c96d1f70ff6b1b496.exe
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
863c612734f5ff0ff0ea3fed7fd790dfb43c47eecdc1417bcd82c0ad866419af.exe
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
91eab57eaf00089ffd21329eb93e072c8eb7ed79e37c807f6db2859548c8b5d8.exe
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
942263c89534d74459991db826caf2e9a187c074730f5c4f0f83f8c91e980e38.exe
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
95193266e37a3401a0becace6d41171ab2968ed5289d666043251d05552d02fc.exe
Resource
win10-20240404-en
General
-
Target
71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll
-
Size
402KB
-
MD5
74d8ec87fcc6d4fb65dea95cbf0b7ed0
-
SHA1
0907206e93cbf8492e673c59855965bb6bd9d6aa
-
SHA256
71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e
-
SHA512
5fff54384cf81a4fb2b27b25bd574630b85dbf8d1b9a9f94188720e92ee3ba8e9ed0e921922e2bba29748a2d5892330faa3780595c6977ae645170e94fb5438b
-
SSDEEP
6144:jI80K7rRaixyrkYTj4tO8eptRnyFWo2NZTLmdJdWqF83kdE0WPQ2:N0K7rRaUuTj/8eC6H8JZZdE3
Malware Config
Extracted
qakbot
401.62
tr02
1607427512
73.32.115.251:443
161.199.180.159:443
185.163.221.77:2222
197.161.154.132:443
105.198.236.99:443
83.196.50.197:2222
96.225.88.23:443
156.222.27.207:995
81.214.126.173:2222
83.110.13.182:2222
85.121.42.12:443
67.82.244.199:2222
172.87.157.235:3389
86.176.133.145:2222
72.186.1.237:443
80.11.5.65:2222
94.59.236.155:995
81.150.181.168:2222
184.98.97.227:995
149.28.101.90:443
86.125.205.97:443
110.142.205.182:443
83.110.250.71:995
41.228.242.14:443
37.106.7.7:443
164.155.230.98:443
2.88.246.223:443
193.83.25.177:995
109.154.193.21:2222
67.141.11.98:443
37.116.152.122:2078
96.40.175.33:443
2.90.124.155:995
162.157.19.33:2222
117.197.217.107:443
24.179.13.119:443
120.150.218.241:443
83.114.243.80:2222
2.50.56.81:443
47.21.192.182:2222
90.53.103.229:2222
77.211.30.202:995
93.146.133.102:2222
96.21.251.127:2222
58.179.21.147:995
98.124.76.187:443
72.36.59.46:2222
86.99.134.235:2222
174.87.65.179:443
193.248.154.174:2222
47.146.34.236:443
63.155.29.193:995
24.95.61.62:443
108.46.145.30:443
32.212.117.188:443
73.166.10.38:50003
105.101.182.178:443
87.218.53.206:2222
71.163.223.144:443
5.193.106.230:2078
184.97.145.239:443
106.51.85.162:443
188.50.187.45:995
45.63.107.192:2222
144.202.38.185:995
151.33.226.156:443
144.202.38.185:443
78.101.158.1:61201
45.32.155.12:443
45.32.162.253:443
173.18.126.193:2222
65.131.41.96:995
149.28.98.196:995
149.28.98.196:443
207.246.75.201:443
178.87.18.221:443
99.244.210.10:443
149.28.101.90:995
149.28.98.196:2222
149.28.99.97:2222
149.28.99.97:443
200.44.237.189:2222
45.63.107.192:995
199.247.16.80:443
144.202.38.185:2222
202.141.244.118:993
85.132.36.111:2222
45.250.69.150:443
111.95.212.237:2222
2.89.122.180:995
79.166.96.86:2222
109.93.245.93:995
78.181.19.134:443
83.202.68.220:2222
217.39.74.146:2222
156.213.147.56:443
72.182.209.97:2222
86.162.13.35:2222
37.21.231.245:995
2.132.32.23:995
187.202.166.21:443
78.187.125.116:2222
80.14.22.234:2222
89.137.211.239:443
81.97.154.100:443
86.121.43.200:443
31.5.21.66:995
80.227.5.70:443
91.104.235.91:995
188.161.207.196:443
109.205.204.229:2222
24.218.181.15:443
72.28.255.159:995
118.40.124.211:443
141.237.135.194:443
149.28.101.90:2222
78.162.70.119:443
39.36.225.15:995
47.22.148.6:995
209.210.187.52:443
85.105.29.218:443
197.86.204.201:443
86.245.87.251:2078
37.106.117.51:443
176.58.133.136:2222
59.103.76.230:443
195.97.101.40:443
2.89.122.180:993
110.159.80.243:443
95.77.223.148:443
79.129.252.62:2222
182.161.6.57:3389
5.193.177.247:2078
41.39.134.183:443
95.76.27.6:443
74.124.191.6:443
184.21.136.237:995
185.105.131.233:443
2.50.2.216:443
24.206.4.203:2222
5.70.178.62:443
2.7.202.106:2222
92.154.83.96:2078
93.113.177.152:443
151.27.88.197:443
160.3.184.253:443
89.136.226.44:995
78.97.110.47:443
92.154.83.96:2087
78.63.226.32:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3020 regsvr32.exe 1064 regsvr32.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1624 4652 WerFault.exe 73 5016 3020 WerFault.exe 80 2072 1064 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Service regsvr32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4652 regsvr32.exe 4652 regsvr32.exe 4652 regsvr32.exe 4652 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4652 regsvr32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4652 3040 regsvr32.exe 73 PID 3040 wrote to memory of 4652 3040 regsvr32.exe 73 PID 3040 wrote to memory of 4652 3040 regsvr32.exe 73 PID 4652 wrote to memory of 3700 4652 regsvr32.exe 74 PID 4652 wrote to memory of 3700 4652 regsvr32.exe 74 PID 4652 wrote to memory of 3700 4652 regsvr32.exe 74 PID 4652 wrote to memory of 3700 4652 regsvr32.exe 74 PID 4652 wrote to memory of 3700 4652 regsvr32.exe 74 PID 3700 wrote to memory of 3376 3700 explorer.exe 77 PID 3700 wrote to memory of 3376 3700 explorer.exe 77 PID 3700 wrote to memory of 3376 3700 explorer.exe 77 PID 4808 wrote to memory of 3020 4808 regsvr32.exe 80 PID 4808 wrote to memory of 3020 4808 regsvr32.exe 80 PID 4808 wrote to memory of 3020 4808 regsvr32.exe 80 PID 1704 wrote to memory of 1064 1704 regsvr32.exe 83 PID 1704 wrote to memory of 1064 1704 regsvr32.exe 83 PID 1704 wrote to memory of 1064 1704 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn cdddvmzq /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll\"" /SC ONCE /Z /ST 19:42 /ET 19:544⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 7643⤵
- Program crash
PID:1624
-
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 5963⤵
- Program crash
PID:5016
-
-
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 5963⤵
- Program crash
PID:2072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\71e2483b2d36765651132c9c1f935784a2008a91159b0ee3bbfb94193d0d644e.dll
Filesize402KB
MD51b19895b97a55c26e3c4095ead06f24a
SHA1c49fe662b6c7c7dbd514bb31d3f30e77aba793c2
SHA256c4320df7798e30db962467c4710c01209938204a50c2d397b69d02da1cff53b4
SHA512680ba52ae07ee3eb9aaa588fa1fb13837b50e1466cb92d0e2e7d692e244adc0b90b632064d9fa5dc8517add6c4ebd6d51d6003b88ae29c3c881a289e89789818