Analysis

  • max time kernel
    104s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    26-03-2022 23:49

General

  • Target

    163896be59a47332596b2aa974762ded456be52ca4d910c4f2ea29b208260712.dll

  • Size

    2.9MB

  • MD5

    e7f94629c50bf5d56e28e192e0eacd47

  • SHA1

    32d34e1a196f9c0fc15103911072db797e5aaccd

  • SHA256

    163896be59a47332596b2aa974762ded456be52ca4d910c4f2ea29b208260712

  • SHA512

    2be01153d351b047e25aa180c417121c33377b23ce6e423c5c3a652b58582c28203a61b7975824347b29bf5319f3995a8f15d6526fd66705736097a5a2393bcb

Malware Config

Extracted

Family

qakbot

Version

401.29

Botnet

abc100

Campaign

1606289576

C2

198.2.35.226:2222

84.78.128.76:2078

120.150.34.178:443

24.201.61.153:2078

217.128.117.218:2222

217.133.54.140:32100

156.205.56.98:995

98.26.50.62:995

172.114.116.226:995

109.209.94.165:2222

72.190.101.70:443

92.59.35.196:2083

37.107.82.136:443

85.132.36.111:2222

174.76.11.123:995

219.74.176.225:443

98.118.156.172:443

94.59.120.142:443

72.29.181.78:2078

178.223.20.246:995

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\163896be59a47332596b2aa974762ded456be52ca4d910c4f2ea29b208260712.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:504
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\163896be59a47332596b2aa974762ded456be52ca4d910c4f2ea29b208260712.dll,#1
      2⤵
        PID:5100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 616
          3⤵
          • Program crash
          PID:860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 5100 -ip 5100
      1⤵
        PID:4144

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5100-124-0x0000000000000000-mapping.dmp
      • memory/5100-125-0x00000000029C0000-0x0000000002BAA000-memory.dmp
        Filesize

        1.9MB

      • memory/5100-126-0x0000000000F40000-0x0000000000F60000-memory.dmp
        Filesize

        128KB