Resubmissions

09-02-2022 14:19

220209-rna76safhq 10

08-02-2022 07:08

220208-hyfe7segb2 10

08-02-2022 06:34

220208-hb21paefa3 10

01-02-2022 11:44

220201-nv5htaecc6 10

31-01-2022 20:44

220131-zh6qwsccf2 10

31-01-2022 19:46

220131-yg4pgabbdp 10

31-01-2022 18:02

220131-wmjv5safgm 10

Analysis

  • max time kernel
    2694s
  • max time network
    2709s
  • platform
    windows7_x64
  • resource
    win7-de-20211208
  • submitted
    31-01-2022 19:46

General

  • Target

    111.dll

  • Size

    1.8MB

  • MD5

    d12984d1fd1dcf63026ed1e6ebfe528a

  • SHA1

    853a8d074df6e31219a8aff36843b9c4c06fce85

  • SHA256

    4a59695c3c4af42c92808e4caf4160b9aa76ba84d8a917d05e9d4a06b0fc4f3f

  • SHA512

    370a0530c2553046a5664152e939ff6a55e77e2b6646d29edde4e44072da271cdc4b13ec8066cb6af2d8b2ad0c737adb36c817d969038716b0adfb5620e44f46

Malware Config

Extracted

Family

qakbot

Version

403.10

Botnet

bhs02

Campaign

1643626574

C2

37.186.54.18:995

182.191.92.203:995

67.209.195.198:443

186.64.87.224:443

31.167.160.170:443

96.246.158.154:995

86.98.47.119:61200

75.156.151.34:443

45.9.20.200:443

76.23.237.163:995

78.96.235.245:443

102.65.38.67:443

89.211.184.52:2222

193.251.59.245:2222

94.60.254.81:443

24.222.20.254:443

114.79.148.170:443

94.59.253.222:2222

129.208.150.26:995

103.139.242.30:990

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 6 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\111.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\111.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn snzuglu /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\111.dll\"" /SC ONCE /Z /ST 20:49 /ET 21:01
          4⤵
          • Creates scheduled task(s)
          PID:1996
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0AEC113D-D115-44F7-8D71-15A44A2876FA} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\111.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\Users\Admin\AppData\Local\Temp\111.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:1272
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ccxmnaoeyn" /d "0"
            5⤵
              PID:1816
            • C:\Windows\system32\reg.exe
              C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Bdsnt" /d "0"
              5⤵
                PID:1456
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {253422E2-0709-490A-A6C8-5262049F2D19} S-1-5-18:NT AUTHORITY\System:Service:
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Windows\system32\regsvr32.exe
          regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\111.dll"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:944
          • C:\Windows\SysWOW64\regsvr32.exe
            -s "C:\Users\Admin\AppData\Local\Temp\111.dll"
            3⤵
              PID:1748
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {22A11272-B5AB-495F-A6ED-5CEB79D10EDE} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Program Files\Mozilla Firefox\default-browser-agent.exe
            "C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task
            2⤵
              PID:1648
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {FE10F003-98EC-447C-8293-2C6CB47BB12C} S-1-5-18:NT AUTHORITY\System:Service:
            1⤵
              PID:580

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scheduled Task

            1
            T1053

            Persistence

            Scheduled Task

            1
            T1053

            Privilege Escalation

            Scheduled Task

            1
            T1053

            Defense Evasion

            Disabling Security Tools

            1
            T1089

            Modify Registry

            1
            T1112

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\111.dll
              MD5

              d12984d1fd1dcf63026ed1e6ebfe528a

              SHA1

              853a8d074df6e31219a8aff36843b9c4c06fce85

              SHA256

              4a59695c3c4af42c92808e4caf4160b9aa76ba84d8a917d05e9d4a06b0fc4f3f

              SHA512

              370a0530c2553046a5664152e939ff6a55e77e2b6646d29edde4e44072da271cdc4b13ec8066cb6af2d8b2ad0c737adb36c817d969038716b0adfb5620e44f46

            • C:\Users\Admin\AppData\Local\Temp\111.dll
              MD5

              175a73b3d5a52f5ce8a5f92b19b1b846

              SHA1

              4566215ba043478ded5e48dd333c4d7e16ab65c0

              SHA256

              670cee9a9cbaec864f8e483b7f9e50082bfcf911e642068e7d9ef36f8bb68b7f

              SHA512

              e7113dc527cf295b5ede8a1a54c0141e164bebb30b1cad29afe90eeadceed67fd8e15c5839d9b87f610bd684db05ddf191ddda2146eee6d296848ab16287d089

            • \Users\Admin\AppData\Local\Temp\111.dll
              MD5

              d12984d1fd1dcf63026ed1e6ebfe528a

              SHA1

              853a8d074df6e31219a8aff36843b9c4c06fce85

              SHA256

              4a59695c3c4af42c92808e4caf4160b9aa76ba84d8a917d05e9d4a06b0fc4f3f

              SHA512

              370a0530c2553046a5664152e939ff6a55e77e2b6646d29edde4e44072da271cdc4b13ec8066cb6af2d8b2ad0c737adb36c817d969038716b0adfb5620e44f46

            • memory/580-56-0x0000000001D20000-0x0000000001EF5000-memory.dmp
              Filesize

              1.8MB

            • memory/580-61-0x0000000000220000-0x0000000000490000-memory.dmp
              Filesize

              2.4MB

            • memory/580-62-0x0000000000220000-0x0000000000490000-memory.dmp
              Filesize

              2.4MB

            • memory/580-55-0x0000000075951000-0x0000000075953000-memory.dmp
              Filesize

              8KB

            • memory/836-63-0x0000000000080000-0x0000000000082000-memory.dmp
              Filesize

              8KB

            • memory/836-66-0x00000000000E0000-0x0000000000101000-memory.dmp
              Filesize

              132KB

            • memory/836-65-0x0000000074EA1000-0x0000000074EA3000-memory.dmp
              Filesize

              8KB

            • memory/1272-81-0x0000000000080000-0x00000000000A1000-memory.dmp
              Filesize

              132KB

            • memory/1540-71-0x0000000000A40000-0x0000000000C15000-memory.dmp
              Filesize

              1.8MB

            • memory/1540-73-0x00000000006E0000-0x0000000000701000-memory.dmp
              Filesize

              132KB

            • memory/1540-72-0x00000000006E0000-0x0000000000701000-memory.dmp
              Filesize

              132KB

            • memory/1540-75-0x00000000006E0000-0x0000000000701000-memory.dmp
              Filesize

              132KB

            • memory/1540-74-0x00000000006E0000-0x0000000000701000-memory.dmp
              Filesize

              132KB

            • memory/1540-80-0x00000000006E0000-0x0000000000701000-memory.dmp
              Filesize

              132KB

            • memory/1540-79-0x0000000000470000-0x00000000004A1000-memory.dmp
              Filesize

              196KB

            • memory/1796-67-0x000007FEFC221000-0x000007FEFC223000-memory.dmp
              Filesize

              8KB