Analysis

  • max time kernel
    144s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    25-12-2021 04:00

General

  • Target

    017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll

  • Size

    1.8MB

  • MD5

    bc5790b25d7c562724938d58612f3466

  • SHA1

    3472be4b855c1fc8242ea45022fb020e7e224b19

  • SHA256

    017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6

  • SHA512

    c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db

Malware Config

Extracted

Family

qakbot

Version

403.10

Botnet

cullinan

Campaign

1640170781

C2

14.96.108.245:61202

182.191.92.203:995

136.232.34.70:443

93.48.80.198:995

140.82.49.12:443

32.221.229.7:443

24.152.219.253:995

31.35.28.29:443

96.37.113.36:993

190.39.205.165:443

79.173.195.234:443

39.49.66.100:995

103.139.242.30:22

79.167.192.206:995

45.9.20.200:2211

24.95.61.62:443

37.210.226.125:61202

103.139.242.30:995

70.163.1.219:443

103.143.8.71:6881

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3912
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn lyyafrv /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll\"" /SC ONCE /Z /ST 19:04 /ET 19:16
          4⤵
          • Creates scheduled task(s)
          PID:2280
  • \??\c:\windows\system32\regsvr32.exe
    regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\SysWOW64\regsvr32.exe
      -s "C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:3688
        • C:\Windows\system32\reg.exe
          C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Xyfcegusauk" /d "0"
          4⤵
            PID:1196
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Muqhdazdezm" /d "0"
            4⤵
              PID:3716

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Disabling Security Tools

      1
      T1089

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
        MD5

        bc5790b25d7c562724938d58612f3466

        SHA1

        3472be4b855c1fc8242ea45022fb020e7e224b19

        SHA256

        017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6

        SHA512

        c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db

      • C:\Windows\System32\CatRoot2\dberr.txt
        MD5

        73434e1fd6facf8fe053ff69f36166e9

        SHA1

        2e61ea9d2a868da502b2120c368a77c6f92506d0

        SHA256

        260986b1480c683cffb7fd28e3ae44855a49c17af9f31acd0f7113c4a42bc92f

        SHA512

        da1da90544b9e014dbfeaa2ce8d2afca8a6887582396b671f5188d60d2b067737c1b317d8f465015778553492b3d52242be4db769529d6933ad6b67e59161c62

      • \Users\Admin\AppData\Local\Temp\017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6.dll
        MD5

        bc5790b25d7c562724938d58612f3466

        SHA1

        3472be4b855c1fc8242ea45022fb020e7e224b19

        SHA256

        017dc2e32d24734096b82e11c91fbba15e45181fbbd7f611abb963eaaea9a3e6

        SHA512

        c24cc45592c0767708b851ee3937a7cdf37808be592e4e863306552be8b345cc78d5742c09e5d39f142b2a8391371816281ae2cdc070f997312896c150f9d7db

      • memory/1196-129-0x0000000000000000-mapping.dmp
      • memory/2280-119-0x0000000000000000-mapping.dmp
      • memory/2752-127-0x0000000000570000-0x00000000006BA000-memory.dmp
        Filesize

        1.3MB

      • memory/2752-124-0x0000000000000000-mapping.dmp
      • memory/3688-133-0x0000000002DB0000-0x0000000002DD1000-memory.dmp
        Filesize

        132KB

      • memory/3688-132-0x0000000003790000-0x0000000003791000-memory.dmp
        Filesize

        4KB

      • memory/3688-131-0x0000000003790000-0x0000000003791000-memory.dmp
        Filesize

        4KB

      • memory/3688-128-0x0000000000000000-mapping.dmp
      • memory/3716-130-0x0000000000000000-mapping.dmp
      • memory/3736-116-0x0000000000E00000-0x0000000000EAE000-memory.dmp
        Filesize

        696KB

      • memory/3736-117-0x0000000010000000-0x00000000101DC000-memory.dmp
        Filesize

        1.9MB

      • memory/3736-115-0x0000000000000000-mapping.dmp
      • memory/3912-120-0x00000000043F0000-0x00000000043F1000-memory.dmp
        Filesize

        4KB

      • memory/3912-118-0x0000000000000000-mapping.dmp
      • memory/3912-122-0x0000000002850000-0x0000000002871000-memory.dmp
        Filesize

        132KB

      • memory/3912-121-0x00000000043F0000-0x00000000043F1000-memory.dmp
        Filesize

        4KB