Analysis Overview
SHA256
0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2
Threat Level: Known bad
The file 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.exe was found to be: Known bad.
Malicious Activity Summary
Windows security bypass
Qakbot family
Qakbot/Qbot
Loads dropped DLL
System Location Discovery: System Language Discovery
Unsigned PE
Suspicious behavior: MapViewOfSection
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-20 20:51
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-20 20:51
Reported
2024-11-20 20:54
Platform
win7-20241010-en
Max time kernel
135s
Max time network
124s
Command Line
Signatures
Qakbot family
Qakbot/Qbot
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ugzvofkn /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll\"" /SC ONCE /Z /ST 20:54 /ET 21:06
C:\Windows\system32\taskeng.exe
taskeng.exe {17E1B37C-3F25-4120-B338-19591A0C0FA0} S-1-5-18:NT AUTHORITY\System:Service:
C:\Windows\system32\regsvr32.exe
regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"
C:\Windows\SysWOW64\regsvr32.exe
-s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"
Network
Files
memory/2824-0-0x00000000750B0000-0x00000000751A3000-memory.dmp
memory/2824-1-0x00000000750B0000-0x00000000751A3000-memory.dmp
memory/2824-4-0x00000000750B0000-0x00000000751A3000-memory.dmp
memory/2824-3-0x000000007518F000-0x0000000075195000-memory.dmp
memory/2904-5-0x00000000000B0000-0x00000000000B2000-memory.dmp
memory/2904-6-0x0000000000080000-0x00000000000A1000-memory.dmp
memory/2824-7-0x00000000750B0000-0x00000000751A3000-memory.dmp
memory/2904-10-0x0000000000080000-0x00000000000A1000-memory.dmp
memory/2904-12-0x0000000000080000-0x00000000000A1000-memory.dmp
memory/2904-11-0x0000000000080000-0x00000000000A1000-memory.dmp
memory/2904-14-0x0000000000080000-0x00000000000A1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll
| MD5 | 44e60ee86b4cb4188bdd08e3b49c0bf5 |
| SHA1 | c271311550ce154650896787afef4a3f8ae86620 |
| SHA256 | 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2 |
| SHA512 | 193619bda32192c7ac61a8ed427cde79ca8aa2d77775bc714cfcb564915b3d7967cfc338877a27e633030aff30f1ce35c3056979e56941dafb9dc85e015e1e03 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-20 20:51
Reported
2024-11-20 20:54
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
Qakbot family
Qakbot/Qbot
Windows security bypass
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\system32\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Ioinsohjles = "0" | C:\Windows\system32\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths | C:\Windows\system32\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Refyhlbuuy = "0" | C:\Windows\system32\reg.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\edf48a9b = e12627a0980d4d779b978ebb4ba608ab8d5cfd594c47eaae548ed04c01563649e77ac36082123aaed79d4f4a1935687dd1705cde | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\d86b5ad5 = dc4af10d0f72ff0efd069ed56cd3e5205caffe518c290845b4919b6476998bfcdd0c88346afe7f473161fdf4f91fa3efcc5b15ad9a013d21d08ced97d66267c60cced6d34709b541ebd7dd6052046a1e34491aef93032dead0951efb54118208142245c59388364a83a47982f89947c3456a563ad7db110296303703de2024 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\60d73db0 = 383867ee039fc7a4ff4a641a1acd6d9e0981eea5c8933960b77470128f0547ccf5bb6302a45f | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\92bde56d = dd9676ee75529d60ba331cb4f5cb10e198f9973cee950ace80c9c0222e19cc890464dd9386adb251dd283d | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\edf48a9b = e12630a0980d78fe9fbc998fab0be67549f67644376240472524a222f8a5d55c9e4704f47d58bd7d5a1403f77a6b802b3ac7942b3d6d6d195f4e2b4fbd01cb052d3cb501a4b9503050 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\da2a7aa9 = 67d230b99684b08b5bace36fc2b2bc0b4069c0417d007149959c49c9f6fd79fb8c6d752624251702a4269b9447547f489ac2bfae50a58fce7d93ee671a4e23d4 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\62961dcc = 90b4d418b91e0a9d43f7385ec64c5beac2118ec7fc3e9407b640dea34576443844e6129b90c4368c7be55dd03e2da1e3d0e4061c4677137706104dea90a9849f342647b32c0873c53b77890ed477c41b139a | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\1f9e5246 = 67105d9c1fb3ff0e019529407bb6f54a6f3aba14c61b03055ee323 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\a7223523 = 9026bc7995a5027b0bed5148070bf38f656b6e8de1e14294d383f7b966b56134fffa | C:\Windows\SysWOW64\explorer.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn nrlmprt /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll\"" /SC ONCE /Z /ST 20:53 /ET 21:05
C:\Windows\system32\regsvr32.exe
regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"
C:\Windows\SysWOW64\regsvr32.exe
-s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\system32\reg.exe
C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Refyhlbuuy" /d "0"
C:\Windows\system32\reg.exe
C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ioinsohjles" /d "0"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
memory/4668-1-0x0000000074D1F000-0x0000000074D25000-memory.dmp
memory/4668-0-0x0000000074C40000-0x0000000074D33000-memory.dmp
memory/4668-2-0x0000000074C40000-0x0000000074D33000-memory.dmp
memory/4668-3-0x0000000074C40000-0x0000000074D33000-memory.dmp
memory/1592-5-0x0000000001250000-0x0000000001271000-memory.dmp
memory/4668-6-0x0000000074C40000-0x0000000074D33000-memory.dmp
memory/1592-9-0x0000000001250000-0x0000000001271000-memory.dmp
memory/1592-11-0x0000000001250000-0x0000000001271000-memory.dmp
memory/1592-10-0x0000000001250000-0x0000000001271000-memory.dmp
memory/1592-13-0x0000000001250000-0x0000000001271000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll
| MD5 | 44e60ee86b4cb4188bdd08e3b49c0bf5 |
| SHA1 | c271311550ce154650896787afef4a3f8ae86620 |
| SHA256 | 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2 |
| SHA512 | 193619bda32192c7ac61a8ed427cde79ca8aa2d77775bc714cfcb564915b3d7967cfc338877a27e633030aff30f1ce35c3056979e56941dafb9dc85e015e1e03 |
memory/4656-17-0x0000000074BB0000-0x0000000074CA3000-memory.dmp
memory/4656-19-0x0000000074BB0000-0x0000000074CA3000-memory.dmp
\??\PIPE\wkssvc
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/4656-21-0x0000000074BB0000-0x0000000074CA3000-memory.dmp
memory/3936-23-0x0000000000EB0000-0x0000000000ED1000-memory.dmp
memory/3936-24-0x0000000000EB0000-0x0000000000ED1000-memory.dmp
memory/3936-25-0x0000000000EB0000-0x0000000000ED1000-memory.dmp