Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    07-05-2021 12:27

General

  • Target

    4568b57ad46502fe4740a6ec3282a874.exe

  • Size

    491KB

  • MD5

    4568b57ad46502fe4740a6ec3282a874

  • SHA1

    bed4802d8f6ec52c5e6a9215d78e0632d2ac11a0

  • SHA256

    b5a90a7357ddd95c88a6f042f9a5b9d388ce936df393987a565209a140046905

  • SHA512

    c704d8f493c653e6573172a3763a1186a30092e0534a677583b6b901d1599ed181c8c199e4a9f1e59bb82296ce8c9fa273df39ec819ba6da0e45dba508942a47

Malware Config

Extracted

Family

qakbot

Version

324.142

Botnet

domain01

Campaign

1591171636

C2

67.165.206.193:995

173.187.103.35:443

47.153.115.154:443

188.192.75.8:995

47.40.244.237:443

142.129.227.86:443

39.36.14.99:995

45.77.164.175:443

71.241.247.189:443

103.76.160.110:443

117.192.100.60:443

207.246.71.122:443

144.202.48.107:443

93.118.221.117:443

45.77.215.141:443

71.185.60.227:443

178.86.244.141:443

72.204.242.138:53

47.41.3.40:443

24.202.42.48:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4568b57ad46502fe4740a6ec3282a874.exe
    "C:\Users\Admin\AppData\Local\Temp\4568b57ad46502fe4740a6ec3282a874.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Users\Admin\AppData\Local\Temp\4568b57ad46502fe4740a6ec3282a874.exe
      C:\Users\Admin\AppData\Local\Temp\4568b57ad46502fe4740a6ec3282a874.exe /C
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      PID:2616
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\4568b57ad46502fe4740a6ec3282a874.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Windows\SysWOW64\PING.EXE
        ping.exe -n 6 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2268

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2208-119-0x0000000000000000-mapping.dmp
  • memory/2268-120-0x0000000000000000-mapping.dmp
  • memory/2616-116-0x0000000000000000-mapping.dmp
  • memory/2616-118-0x0000000000400000-0x000000000047E000-memory.dmp
    Filesize

    504KB

  • memory/3872-115-0x0000000000400000-0x000000000047E000-memory.dmp
    Filesize

    504KB

  • memory/3872-114-0x0000000002090000-0x00000000020C7000-memory.dmp
    Filesize

    220KB