Resubmissions

25-01-2022 11:49

220125-ny1zssfed9 10

24-01-2022 17:16

220124-vs87jsfhc9 10

24-01-2022 16:22

220124-tvkrasfec4 10

Analysis

  • max time kernel
    1756s
  • max time network
    1570s
  • platform
    windows10_x64
  • resource
    win10-ja-20211208
  • submitted
    25-01-2022 11:49

General

  • Target

    ba7e9131dd5aa9f2e7e0050c688d2830787dd01e8d58aef364a878b61156b35b.dll

  • Size

    1.6MB

  • MD5

    6317f9ae495c49ab7b5e5b501a5639ef

  • SHA1

    2d49c0f32a441d09ddee7c3b2b019ae8904ea1e7

  • SHA256

    ba7e9131dd5aa9f2e7e0050c688d2830787dd01e8d58aef364a878b61156b35b

  • SHA512

    bd9c6df8b2d91959580c6227a990882625c029528c0e53a600de8f6cc970e95fbb26108f3ae7f1bc8ef18d2b4b429490ec4ae5f6935e47c6c44dbf06c21be4f1

Malware Config

Extracted

Family

qakbot

Version

403.2

Botnet

obama152

Campaign

1643019304

C2

96.80.109.57:995

209.210.95.228:32100

180.233.150.134:995

149.135.101.20:443

38.70.253.226:2222

24.222.20.254:443

83.110.2.97:443

78.87.44.54:995

86.108.46.251:443

74.15.2.252:2222

102.65.38.67:443

37.203.225.248:443

75.139.7.190:2083

24.53.49.240:443

80.14.196.176:2222

94.60.254.81:443

86.98.32.228:443

130.164.129.3:443

176.67.56.94:443

31.167.160.170:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Program crash 1 IoCs
  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 14 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ba7e9131dd5aa9f2e7e0050c688d2830787dd01e8d58aef364a878b61156b35b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ba7e9131dd5aa9f2e7e0050c688d2830787dd01e8d58aef364a878b61156b35b.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 696
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Windows\SysWOW64\whoami.exe
          whoami /all
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4456
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c set
          4⤵
            PID:3664
          • C:\Windows\SysWOW64\arp.exe
            arp -a
            4⤵
              PID:3416
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              4⤵
              • Gathers network information
              PID:3304
            • C:\Windows\SysWOW64\net.exe
              net view /all
              4⤵
              • Discovers systems in the same network
              PID:2216
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP
              4⤵
                PID:3944
              • C:\Windows\SysWOW64\net.exe
                net share
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4644
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 share
                  5⤵
                    PID:980
                • C:\Windows\SysWOW64\route.exe
                  route print
                  4⤵
                    PID:4480
                  • C:\Windows\SysWOW64\netstat.exe
                    netstat -nao
                    4⤵
                    • Gathers network information
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3896
                  • C:\Windows\SysWOW64\net.exe
                    net localgroup
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1496
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 localgroup
                      5⤵
                        PID:2116
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -s wlidsvc
                1⤵
                • Modifies data under HKEY_USERS
                PID:1240
              • C:\Windows\system32\msfeedssync.exe
                C:\Windows\system32\msfeedssync.exe sync
                1⤵
                • Modifies Internet Explorer settings
                PID:4860
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2764

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Command-Line Interface

              1
              T1059

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Remote System Discovery

              1
              T1018

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1924-118-0x0000000004950000-0x0000000004971000-memory.dmp
                Filesize

                132KB

              • memory/1924-119-0x0000000004950000-0x0000000004971000-memory.dmp
                Filesize

                132KB

              • memory/1924-120-0x0000000004900000-0x0000000004943000-memory.dmp
                Filesize

                268KB

              • memory/1924-121-0x0000000004950000-0x0000000004971000-memory.dmp
                Filesize

                132KB

              • memory/4732-122-0x0000000000E30000-0x0000000000E51000-memory.dmp
                Filesize

                132KB