Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    25-12-2021 04:00

General

  • Target

    017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll

  • Size

    1.8MB

  • MD5

    bc5790b25d7c562724938d58612f3466

  • SHA1

    3472be4b855c1fc8242ea45022fb020e7e224b19

  • SHA256

    017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6

  • SHA512

    c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db

Malware Config

Extracted

Family

qakbot

Version

403.10

Botnet

cullinan

Campaign

1640170781

C2

14.96.108.245:61202

182.191.92.203:995

136.232.34.70:443

93.48.80.198:995

140.82.49.12:443

32.221.229.7:443

24.152.219.253:995

31.35.28.29:443

96.37.113.36:993

190.39.205.165:443

79.173.195.234:443

39.49.66.100:995

103.139.242.30:22

79.167.192.206:995

45.9.20.200:2211

24.95.61.62:443

37.210.226.125:61202

103.139.242.30:995

70.163.1.219:443

103.143.8.71:6881

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:336
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn vmtzfjz /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll\"" /SC ONCE /Z /ST 04:02 /ET 04:14
          4⤵
          • Creates scheduled task(s)
          PID:904
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {DFAF2D6C-6178-433B-9A93-DF9FF11E97BC} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll"
        3⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:1776
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Otpuxfnsajbq" /d "0"
            5⤵
              PID:1076
            • C:\Windows\system32\reg.exe
              C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Hpminjoyp" /d "0"
              5⤵
                PID:976

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Disabling Security Tools

      1
      T1089

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
        MD5

        bc5790b25d7c562724938d58612f3466

        SHA1

        3472be4b855c1fc8242ea45022fb020e7e224b19

        SHA256

        017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6

        SHA512

        c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db

      • C:\Windows\System32\CatRoot2\dberr.txt
        MD5

        d1b01deff326d9e2f9626e339c385589

        SHA1

        b81210855180a268569f104cd4093c88727f76bd

        SHA256

        5df988f746ccc6ec9eb581f2a0ac6d7246fdd7f5491661dc3edd5cb603ded8ab

        SHA512

        28dd095728b72f1e977f37b9cb31de47c46209634247723a3ad04313a378066f137506e552e536f160b733a980102c9fa9d86cff26d010b81f49eee7e56a6431

      • \Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
        MD5

        bc5790b25d7c562724938d58612f3466

        SHA1

        3472be4b855c1fc8242ea45022fb020e7e224b19

        SHA256

        017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6

        SHA512

        c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db

      • memory/336-62-0x0000000074671000-0x0000000074673000-memory.dmp
        Filesize

        8KB

      • memory/336-63-0x00000000000D0000-0x00000000000F1000-memory.dmp
        Filesize

        132KB

      • memory/336-59-0x0000000000080000-0x0000000000082000-memory.dmp
        Filesize

        8KB

      • memory/336-60-0x0000000000000000-mapping.dmp
      • memory/752-58-0x0000000010000000-0x00000000101DC000-memory.dmp
        Filesize

        1.9MB

      • memory/752-57-0x0000000000180000-0x0000000000181000-memory.dmp
        Filesize

        4KB

      • memory/752-56-0x0000000075431000-0x0000000075433000-memory.dmp
        Filesize

        8KB

      • memory/752-55-0x0000000000000000-mapping.dmp
      • memory/904-64-0x0000000000000000-mapping.dmp
      • memory/944-54-0x000007FEFBE11000-0x000007FEFBE13000-memory.dmp
        Filesize

        8KB

      • memory/976-77-0x0000000000000000-mapping.dmp
      • memory/1076-76-0x0000000000000000-mapping.dmp
      • memory/1500-68-0x0000000000000000-mapping.dmp
      • memory/1776-73-0x0000000000000000-mapping.dmp
      • memory/1776-78-0x00000000000C0000-0x00000000000E1000-memory.dmp
        Filesize

        132KB

      • memory/1916-65-0x0000000000000000-mapping.dmp