Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/01/2023, 18:30

230131-w5xvqahf27 10

31/01/2023, 18:16

230131-wwy2eshe77 3

31/01/2023, 17:51

230131-wfchgsbd2v 3

31/01/2023, 17:49

230131-wd521shd85 3

Analysis

  • max time kernel
    720s
  • max time network
    691s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/01/2023, 18:30

General

  • Target

    Qakbot.dll

  • Size

    713KB

  • MD5

    ea01b105c2c1bb90559bea2cd3df26fe

  • SHA1

    cf73e2502f7976288857d81adf812b1b0c7c55d0

  • SHA256

    4a990b2e48bc3a48a93ec155feb21d79201f6bf8b248ecd16367dc14bd2bce75

  • SHA512

    698e72e18a4312b128989068a79869ec58a3e234e4af0516c98ccd0b839397e7bc1e534f316aa97f360dee2f9ce1bb119519010bb4566374ed333325eb84df5c

  • SSDEEP

    12288:9qwFxm3G6H4RyuHbR1MxnuTV/iV1SdURA8s2Q5Qp:QwFxm3G6H4IuHbR1MxnuTV/iV1QTQ

Malware Config

Extracted

Family

qakbot

Version

404.432

Botnet

BB12

Campaign

1675161116

C2

103.252.7.228:443

87.10.205.117:443

82.15.58.109:2222

72.80.7.6:995

90.162.45.154:2222

47.34.30.133:443

50.68.204.71:993

112.141.184.246:995

73.165.119.20:443

91.169.12.198:32100

173.18.126.3:443

87.56.238.53:443

85.241.180.94:443

12.172.173.82:50001

92.154.17.149:2222

103.42.86.246:995

12.172.173.82:990

91.254.132.23:443

121.121.100.207:995

74.92.243.113:50000

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Qakbot.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Qakbot.dll,#1
      2⤵
        PID:2804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 616
          3⤵
          • Program crash
          PID:1264
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\system32\rundll32.exe
        rundll32.exe Qakbot.dll,Wind
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe Qakbot.dll,Wind
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
              PID:4544
            • C:\Windows\SysWOW64\wermgr.exe
              C:\Windows\SysWOW64\wermgr.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3388
              • C:\Windows\SysWOW64\net.exe
                net view
                5⤵
                • Discovers systems in the same network
                PID:5052
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c set
                5⤵
                  PID:2780
                • C:\Windows\SysWOW64\arp.exe
                  arp -a
                  5⤵
                    PID:4812
                  • C:\Windows\SysWOW64\ipconfig.exe
                    ipconfig /all
                    5⤵
                    • Gathers network information
                    PID:4744
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.WORKGROUP
                    5⤵
                      PID:4128
                    • C:\Windows\SysWOW64\net.exe
                      net share
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3952
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 share
                        6⤵
                          PID:2976
                      • C:\Windows\SysWOW64\route.exe
                        route print
                        5⤵
                          PID:60
                        • C:\Windows\SysWOW64\netstat.exe
                          netstat -nao
                          5⤵
                          • Gathers network information
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4848
                        • C:\Windows\SysWOW64\net.exe
                          net localgroup
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1076
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 localgroup
                            6⤵
                              PID:304
                          • C:\Windows\SysWOW64\whoami.exe
                            whoami /all
                            5⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:816
                    • C:\Windows\system32\rundll32.exe
                      rundll32.exe Qakbot.dll,Wind
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1640
                      • C:\Windows\SysWOW64\rundll32.exe
                        rundll32.exe Qakbot.dll,Wind
                        3⤵
                          PID:476
                    • C:\Windows\system32\taskmgr.exe
                      "C:\Windows\system32\taskmgr.exe" /4
                      1⤵
                      • Drops file in Windows directory
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:528
                    • C:\Windows\system32\msiexec.exe
                      C:\Windows\system32\msiexec.exe /V
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1312

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\Qakbot.dll

                      Filesize

                      4KB

                      MD5

                      50fac674a6cd38635b1cf56c1674877e

                      SHA1

                      d6d5ff9a9d8fa202e99db614d25c5d9045adfdca

                      SHA256

                      d146add3ce16e16d692e0f1332599a8075f0127c3e260d046fc44a1c572f1e48

                      SHA512

                      157ae564860b792037be80d14680e0d52071e24183b0de491cc88cea88475a2925c7b86e2fd63b9715aa2344a4dfea329326a556b7c03aab953ac9797d2c0051

                    • \Users\Admin\AppData\Local\Temp\1B5622E4.dll

                      Filesize

                      1.8MB

                      MD5

                      f7202e522a8901da566cbd69d7b195e0

                      SHA1

                      3990af71966ceab9bf73636fcd845dac0b269942

                      SHA256

                      772c5718a6ddaa89d6e6144f275b76046477306afdf8ad3f46c4749845e4248a

                      SHA512

                      a58ca60cbe37c8b0cc195d1bbe8ee9c986392f8781187378d1f2aa96bff1834e4c24f76580d779f6024c0841fc826146d8d4aa909defc7639c95edda079ae124

                    • \Users\Admin\AppData\Local\Temp\1E14EEC3.dll

                      Filesize

                      1.8MB

                      MD5

                      f7202e522a8901da566cbd69d7b195e0

                      SHA1

                      3990af71966ceab9bf73636fcd845dac0b269942

                      SHA256

                      772c5718a6ddaa89d6e6144f275b76046477306afdf8ad3f46c4749845e4248a

                      SHA512

                      a58ca60cbe37c8b0cc195d1bbe8ee9c986392f8781187378d1f2aa96bff1834e4c24f76580d779f6024c0841fc826146d8d4aa909defc7639c95edda079ae124

                    • memory/2804-154-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-146-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-125-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-126-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-127-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-128-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-129-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-130-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-131-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-132-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-133-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-134-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-135-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-136-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-137-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-138-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-139-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-140-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-141-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-142-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-143-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-144-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-145-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-122-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-147-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-148-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-149-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-150-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-151-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-152-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-153-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-123-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-155-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-156-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-157-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-158-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-124-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-116-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-117-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-118-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-121-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-119-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2804-120-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/3388-267-0x0000000002DD0000-0x0000000002DF3000-memory.dmp

                      Filesize

                      140KB

                    • memory/4492-175-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-181-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-174-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-173-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-168-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-176-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-177-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-167-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-166-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-165-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-178-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-179-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-180-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-172-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-169-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-164-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-161-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-171-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-170-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-163-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/4492-162-0x00000000777D0000-0x000000007795E000-memory.dmp

                      Filesize

                      1.6MB