Analysis
-
max time kernel
129s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
9dc360d1063cf1975d75d74a909f86f1aeedaad81bc81a9a61e37b5b7775469f.dll
Resource
win7-20240903-en
General
-
Target
9dc360d1063cf1975d75d74a909f86f1aeedaad81bc81a9a61e37b5b7775469f.dll
-
Size
2.8MB
-
MD5
9c36ce32befa3cb33d7745873c4db5b3
-
SHA1
51da096433142ebd6e04122a04760d3ff33b27ed
-
SHA256
9dc360d1063cf1975d75d74a909f86f1aeedaad81bc81a9a61e37b5b7775469f
-
SHA512
6d680fc3c94138514bec604e806c5a7404f310c123ba09e2f6caae686f6fdc26886acac5121c6f1892e276081230e69e66c5e5ca7b02e0f0c991713e2c028b65
-
SSDEEP
49152:1VUZMcNCu/aXwvg7CfUCOyzw4LxNPpOcQdRckhdIfTRfWG/Pm:1VgMsD+woufx1fWG/Pm
Malware Config
Extracted
qakbot
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Extracted
qakbot
403.10
obama145
1639478529
120.150.218.241:995
93.48.80.198:995
102.65.38.67:443
218.101.110.3:995
216.238.72.121:443
216.238.72.121:995
207.246.112.221:995
207.246.112.221:443
216.238.71.31:995
216.238.71.31:443
65.100.174.110:443
186.64.87.213:443
136.143.11.232:443
41.228.22.180:443
140.82.49.12:443
39.49.104.126:995
105.198.236.99:995
78.180.163.25:995
2.222.167.138:443
45.9.20.200:2211
103.142.10.177:443
89.101.97.139:443
194.36.28.26:443
31.215.98.160:443
75.188.35.168:995
173.21.10.71:2222
76.25.142.196:443
71.74.12.34:443
73.151.236.31:443
65.100.174.110:8443
100.1.119.41:443
24.55.112.61:443
24.229.150.54:995
109.12.111.14:443
108.4.67.252:443
67.165.206.193:993
72.252.201.34:995
190.73.3.148:2222
68.204.7.158:443
136.232.34.70:443
94.60.254.81:443
89.137.52.44:443
117.198.149.221:443
73.5.119.219:443
86.148.6.51:443
63.143.92.99:995
68.186.192.69:443
182.176.180.73:443
27.223.92.142:995
187.192.61.177:80
73.140.38.124:443
96.37.113.36:993
117.248.109.38:21
217.165.7.254:995
75.169.58.229:32100
27.5.4.111:2222
197.89.144.207:443
86.98.36.211:443
106.220.76.130:443
129.208.139.229:995
45.46.53.140:2222
190.229.210.128:465
91.178.126.51:995
189.18.181.24:995
185.53.147.51:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exeregsvr32.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
regsvr32.exepid process 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 2548 regsvr32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1696 wrote to memory of 2548 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 2548 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 2548 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 2548 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 2548 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 2548 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 2548 1696 regsvr32.exe regsvr32.exe PID 2548 wrote to memory of 1716 2548 regsvr32.exe explorer.exe PID 2548 wrote to memory of 1716 2548 regsvr32.exe explorer.exe PID 2548 wrote to memory of 1716 2548 regsvr32.exe explorer.exe PID 2548 wrote to memory of 1716 2548 regsvr32.exe explorer.exe PID 2548 wrote to memory of 1716 2548 regsvr32.exe explorer.exe PID 2548 wrote to memory of 1716 2548 regsvr32.exe explorer.exe PID 1716 wrote to memory of 2264 1716 explorer.exe schtasks.exe PID 1716 wrote to memory of 2264 1716 explorer.exe schtasks.exe PID 1716 wrote to memory of 2264 1716 explorer.exe schtasks.exe PID 1716 wrote to memory of 2264 1716 explorer.exe schtasks.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9dc360d1063cf1975d75d74a909f86f1aeedaad81bc81a9a61e37b5b7775469f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9dc360d1063cf1975d75d74a909f86f1aeedaad81bc81a9a61e37b5b7775469f.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn hqqqgvr /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\9dc360d1063cf1975d75d74a909f86f1aeedaad81bc81a9a61e37b5b7775469f.dll\"" /SC ONCE /Z /ST 23:58 /ET 24:104⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2264
-
-
-