Analysis

  • max time kernel
    129s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    07-05-2021 06:03

General

  • Target

    1312.gif.dll

  • Size

    2.0MB

  • MD5

    ec11ad0b0b09671b0e1d33a0426fc545

  • SHA1

    f3527e4bbb1f3ea8db2365824c41cd0fac0bdf44

  • SHA256

    caf0413ce43dd36aad32438727ff41ae1b9cd3243e240a21474e606572e35712

  • SHA512

    7953df254175a8db3a16ca079bb770845bb931701ae7ff77274a2d45e26deb5e5456ecbc4053a02d65cc5b806e1442b3395075473efeb583affbeeae20e4463a

Malware Config

Extracted

Family

qakbot

Version

401.78

Botnet

tr02

Campaign

1607955641

C2

120.151.95.167:443

47.44.217.98:443

32.212.117.188:443

184.97.145.239:443

86.121.3.80:443

83.110.97.149:443

83.194.193.247:2222

105.198.236.101:443

35.134.202.234:443

189.62.175.92:22

2.89.122.157:443

78.97.207.104:443

208.93.202.41:443

45.118.216.157:443

5.204.148.208:995

5.15.226.81:443

66.26.160.37:443

84.78.128.76:2222

80.106.85.24:2222

108.31.15.10:995

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1312.gif.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1312.gif.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:912
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ajosyxd /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\1312.gif.dll\"" /SC ONCE /Z /ST 06:01 /ET 06:13
          4⤵
          • Creates scheduled task(s)
          PID:752
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {02F81962-19FF-45F7-A87A-40302BAA2423} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\1312.gif.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\Users\Admin\AppData\Local\Temp\1312.gif.dll"
        3⤵
        • Loads dropped DLL
        PID:624

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1312.gif.dll
    MD5

    7fa71d3adffd18c2f7038dbeaef014b3

    SHA1

    af502b52ecb72f48fe5ef1119607ea4f422be242

    SHA256

    c468670d8b78a054cd22e4aac5853e91383d35a7472f64d46898b4236f88e937

    SHA512

    a2572720d657e868d1abb652f0d2cbc0569f55f9ff8fbb47ac9655179d01e425aa69ee82ebbb81935efc8ebe77c4bec43019542d87743d002c4ef6688e948694

  • \Users\Admin\AppData\Local\Temp\1312.gif.dll
    MD5

    7fa71d3adffd18c2f7038dbeaef014b3

    SHA1

    af502b52ecb72f48fe5ef1119607ea4f422be242

    SHA256

    c468670d8b78a054cd22e4aac5853e91383d35a7472f64d46898b4236f88e937

    SHA512

    a2572720d657e868d1abb652f0d2cbc0569f55f9ff8fbb47ac9655179d01e425aa69ee82ebbb81935efc8ebe77c4bec43019542d87743d002c4ef6688e948694

  • memory/624-71-0x0000000000000000-mapping.dmp
  • memory/752-67-0x0000000000000000-mapping.dmp
  • memory/912-63-0x0000000000000000-mapping.dmp
  • memory/912-65-0x00000000751C1000-0x00000000751C3000-memory.dmp
    Filesize

    8KB

  • memory/912-66-0x0000000000080000-0x00000000000A1000-memory.dmp
    Filesize

    132KB

  • memory/1376-61-0x0000000001E50000-0x000000000203A000-memory.dmp
    Filesize

    1.9MB

  • memory/1376-59-0x0000000000000000-mapping.dmp
  • memory/1376-62-0x0000000010000000-0x0000000010214000-memory.dmp
    Filesize

    2.1MB

  • memory/1376-60-0x0000000076A81000-0x0000000076A83000-memory.dmp
    Filesize

    8KB

  • memory/1556-68-0x0000000000000000-mapping.dmp
  • memory/1556-69-0x000007FEFC471000-0x000007FEFC473000-memory.dmp
    Filesize

    8KB