Overview
overview
10Static
static
GalleryA.lnk
windows7-x64
3GalleryA.lnk
windows10-2004-x64
3checkbook/area.dll
windows7-x64
10checkbook/area.dll
windows10-2004-x64
10checkbook/...ing.js
windows7-x64
3checkbook/...ing.js
windows10-2004-x64
1checkbook/...ng.cmd
windows7-x64
1checkbook/...ng.cmd
windows10-2004-x64
1Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
GalleryA.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GalleryA.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
checkbook/area.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
checkbook/area.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
checkbook/derailingEntangling.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
checkbook/derailingEntangling.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
checkbook/leaguesDong.cmd
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
checkbook/leaguesDong.cmd
Resource
win10v2004-20220812-en
General
-
Target
checkbook/area.dll
-
Size
693KB
-
MD5
c05798268fcde7fbda9305a54389bb79
-
SHA1
72b49520e928a4d4c63b99d8bc68a45abc41cc88
-
SHA256
b9dd2d79e9b78f0d3f439c302f19b0bbec463f135701ab2ea99c27f48fa2eb1a
-
SHA512
8937282bbf257f0d2f2ab86ba4909b3ee8f69d2141b8e419cb245019a0dcd5964c38ab9bc3ada8ef75cbdee02ae05a0f69196d4fb6c4c27351b2e36f36f592e1
-
SSDEEP
12288:/ieL1vc1PdFjpmw5qS6xnGWvE/NIg5UT+QD1lNMAxH:K81IFnqnvE/5w9MW
Malware Config
Extracted
qakbot
403.895
BB
1664358901
179.111.23.186:32101
179.251.119.206:995
84.3.85.30:443
39.44.5.104:995
197.41.235.69:995
193.3.19.137:443
186.81.122.168:443
103.173.121.17:443
41.111.118.56:443
102.189.184.12:995
156.199.90.139:443
14.168.180.223:443
41.140.98.37:995
156.205.3.210:993
139.228.33.176:2222
134.35.12.0:443
49.205.197.13:443
131.100.40.13:995
217.165.146.158:993
73.252.27.208:995
82.217.55.20:443
105.184.13.131:995
176.177.136.35:443
180.232.159.9:443
41.68.209.102:995
211.184.61.250:443
186.90.144.235:2222
191.92.125.254:443
41.96.204.133:443
58.186.75.42:443
102.190.190.242:995
85.86.242.245:443
187.193.143.111:443
200.175.173.80:443
197.49.68.15:995
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2232 4172 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4172 rundll32.exe 4172 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4972 wrote to memory of 4172 4972 rundll32.exe rundll32.exe PID 4972 wrote to memory of 4172 4972 rundll32.exe rundll32.exe PID 4972 wrote to memory of 4172 4972 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\checkbook\area.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\checkbook\area.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 6683⤵
- Program crash
PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4172 -ip 41721⤵PID:748