Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    20-03-2022 05:53

General

  • Target

    7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll

  • Size

    2.4MB

  • MD5

    34de339cf6809e622d246731e6cad0b7

  • SHA1

    474a4804f13b858d43596ab2548637be6956d62b

  • SHA256

    7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554

  • SHA512

    13f0afef6864bf8e052b59fed740f200bc857034f9d523b10ecfde979d7e5ce2cc821a79dc73984fba64c92c043464da321a4f15559328967b2fc574a57320db

Malware Config

Extracted

Family

qakbot

Version

401.138

Botnet

abc114

Campaign

1608129413

C2

86.127.22.190:443

35.139.242.207:443

108.190.194.146:2222

187.213.199.54:443

68.83.89.188:443

41.233.152.232:993

196.151.252.84:443

181.208.249.141:443

172.87.134.226:443

96.27.47.70:2222

83.110.109.78:2222

93.86.1.159:995

217.162.149.212:443

80.11.210.247:443

72.252.201.69:443

185.163.221.77:2222

189.62.175.92:22

95.76.27.6:443

45.77.115.208:443

187.213.82.104:995

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll,#1
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4524
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ajqoyrfwl /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll\"" /SC ONCE /Z /ST 22:18 /ET 22:30
          4⤵
          • Creates scheduled task(s)
          PID:4444
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
    1⤵
    • Modifies data under HKEY_USERS
    PID:824
  • C:\Windows\system32\regsvr32.exe
    regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\regsvr32.exe
      -s "C:\Users\Admin\AppData\Local\Temp\7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll"
      2⤵
      • Loads dropped DLL
      PID:5068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5068 -ip 5068
    1⤵
      PID:2244

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll
      MD5

      f2ab7f178e8f0d31656ecfcd3f0f28b2

      SHA1

      796abc27f6406fff3e361d7f2942816aa56fa6bc

      SHA256

      ffa4941fe7e97cb9c55190f305ba8984ec86f083cf7fa0d77d2ae4bb60949e0b

      SHA512

      00ed05f3c8d03c008df94e76873be426b24524383bca3147c0960b999cf5745721ca12992784a0a80fd13f7a26410463cab2f73c2b79bed8a83b6cb942c2f15c

    • C:\Users\Admin\AppData\Local\Temp\7ef0a71655a467280b779d52831b9e0e0a5c693ed9881a737ca3fdb2d2ae3554.dll
      MD5

      f2ab7f178e8f0d31656ecfcd3f0f28b2

      SHA1

      796abc27f6406fff3e361d7f2942816aa56fa6bc

      SHA256

      ffa4941fe7e97cb9c55190f305ba8984ec86f083cf7fa0d77d2ae4bb60949e0b

      SHA512

      00ed05f3c8d03c008df94e76873be426b24524383bca3147c0960b999cf5745721ca12992784a0a80fd13f7a26410463cab2f73c2b79bed8a83b6cb942c2f15c

    • memory/3704-134-0x0000000002150000-0x000000000233A000-memory.dmp
      Filesize

      1.9MB

    • memory/3704-135-0x0000000010000000-0x0000000010270000-memory.dmp
      Filesize

      2.4MB

    • memory/4524-136-0x0000000000890000-0x0000000000CC3000-memory.dmp
      Filesize

      4.2MB

    • memory/4524-137-0x0000000000840000-0x0000000000875000-memory.dmp
      Filesize

      212KB