Analysis

  • max time kernel
    138s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    22-12-2021 12:47

General

  • Target

    wal1.ocx.dll

  • Size

    724KB

  • MD5

    891e456efe3827daf61778acb8b548ae

  • SHA1

    a67837da74ed35c6bd1cace8119544979f92d7e5

  • SHA256

    f33f13904ac136f6fa015ce4ad3120fdc2929e54fb8d913353ab72989dbb6c7c

  • SHA512

    2577ed482296e3a8ec45e544c80e58156c58eaef06920a5a1c06ec4a8f195256b5bc6ebbf80c2624b30e752bcb987ccf39271f9a1bdc0c0c45d371426d76fa1c

Malware Config

Extracted

Family

qakbot

Version

403.10

Botnet

cullinan

Campaign

1639988898

C2

32.221.229.7:443

140.82.49.12:443

24.152.219.253:995

182.56.99.126:443

76.169.147.192:32103

218.101.110.3:995

89.101.97.139:443

82.152.39.39:443

176.24.150.197:443

96.37.113.36:993

68.186.192.69:443

59.88.168.108:443

75.110.250.187:443

182.191.92.203:995

89.165.88.95:443

103.142.10.177:443

45.9.20.200:2211

24.95.61.62:443

194.36.28.26:443

78.101.82.198:2222

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\wal1.ocx.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\wal1.ocx.dll
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn rkfnmuz /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\wal1.ocx.dll\"" /SC ONCE /Z /ST 16:58 /ET 17:10
          4⤵
          • Creates scheduled task(s)
          PID:4028
  • \??\c:\windows\system32\regsvr32.exe
    regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\wal1.ocx.dll"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\regsvr32.exe
      -s "C:\Users\Admin\AppData\Local\Temp\wal1.ocx.dll"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\system32\reg.exe
          C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Yohczg" /d "0"
          4⤵
            PID:2984
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Cfntof" /d "0"
            4⤵
              PID:3592

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Disabling Security Tools

      1
      T1089

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\wal1.ocx.dll
        MD5

        891e456efe3827daf61778acb8b548ae

        SHA1

        a67837da74ed35c6bd1cace8119544979f92d7e5

        SHA256

        f33f13904ac136f6fa015ce4ad3120fdc2929e54fb8d913353ab72989dbb6c7c

        SHA512

        2577ed482296e3a8ec45e544c80e58156c58eaef06920a5a1c06ec4a8f195256b5bc6ebbf80c2624b30e752bcb987ccf39271f9a1bdc0c0c45d371426d76fa1c

      • C:\Windows\System32\CatRoot2\dberr.txt
        MD5

        3710206ee27a8680d6219877317684f3

        SHA1

        f5cb838b21c4a2e2884aae18501601956cdb9179

        SHA256

        25f136a4223d02ffcb3f51f83261a72fe43b7cc415008db7e15e8c0e2700ddd9

        SHA512

        9d33b12fabf1a6a02526e8f8066446907cf4872d745843fd75f4a0dd7acb4c661cef3b16343553236f68519c4593973f4bbe719ee937c32f13a1e5a4c4a07afb

      • \Users\Admin\AppData\Local\Temp\wal1.ocx.dll
        MD5

        891e456efe3827daf61778acb8b548ae

        SHA1

        a67837da74ed35c6bd1cace8119544979f92d7e5

        SHA256

        f33f13904ac136f6fa015ce4ad3120fdc2929e54fb8d913353ab72989dbb6c7c

        SHA512

        2577ed482296e3a8ec45e544c80e58156c58eaef06920a5a1c06ec4a8f195256b5bc6ebbf80c2624b30e752bcb987ccf39271f9a1bdc0c0c45d371426d76fa1c

      • memory/1156-127-0x0000000000720000-0x0000000000721000-memory.dmp
        Filesize

        4KB

      • memory/1156-124-0x0000000000000000-mapping.dmp
      • memory/1172-133-0x00000000006E0000-0x0000000000701000-memory.dmp
        Filesize

        132KB

      • memory/1172-132-0x0000000000C50000-0x0000000000C51000-memory.dmp
        Filesize

        4KB

      • memory/1172-131-0x0000000000C50000-0x0000000000C51000-memory.dmp
        Filesize

        4KB

      • memory/1172-128-0x0000000000000000-mapping.dmp
      • memory/2348-122-0x0000000003480000-0x00000000034A1000-memory.dmp
        Filesize

        132KB

      • memory/2348-118-0x0000000000000000-mapping.dmp
      • memory/2348-120-0x0000000005010000-0x0000000005011000-memory.dmp
        Filesize

        4KB

      • memory/2348-121-0x0000000005010000-0x0000000005011000-memory.dmp
        Filesize

        4KB

      • memory/2668-117-0x0000000010000000-0x00000000100C1000-memory.dmp
        Filesize

        772KB

      • memory/2668-116-0x0000000000440000-0x00000000004EE000-memory.dmp
        Filesize

        696KB

      • memory/2668-115-0x0000000000000000-mapping.dmp
      • memory/2984-129-0x0000000000000000-mapping.dmp
      • memory/3592-130-0x0000000000000000-mapping.dmp
      • memory/4028-119-0x0000000000000000-mapping.dmp