Resubmissions

10/02/2023, 10:01

230210-l1823shb9s 10

10/02/2023, 09:47

230210-lr74esha58 3

Analysis

  • max time kernel
    154s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/02/2023, 10:01

General

  • Target

    01.png.dll

  • Size

    792KB

  • MD5

    757bb7210f85c61287ea483ffeba6047

  • SHA1

    4e765ed8d01a04d409b3e627e95328057b4a553e

  • SHA256

    7e17200c8df5260abb995b32da65dfb50cca19ddc087236865d41f80d7fe1923

  • SHA512

    d59b760836e7e5246fd1accba41e5eb67d8cc99d9936670f9b7ab19e38e8a1466be179647bfb85eabc0bbb84e4897dc3712f74ca46ad757fcbe87c9f0ca13a91

  • SSDEEP

    24576:bH8Xsmt4vyVjXe1ikZdtjMsc7MscXMscktkTNdi+Y0zs:qefBtkf9zs

Malware Config

Extracted

Family

qakbot

Version

404.506

Botnet

BB14

Campaign

1675933835

C2

50.20.171.2:443

73.36.196.11:443

12.172.173.82:990

86.225.214.138:2222

67.253.226.137:995

84.108.200.161:443

121.121.100.207:995

86.169.203.116:443

150.107.231.59:2222

201.244.108.183:995

81.111.108.123:443

85.241.180.94:443

37.14.229.220:2222

24.64.112.40:50010

91.68.227.219:443

71.112.212.166:443

82.121.195.187:2222

101.184.161.86:2222

81.157.227.223:2222

103.141.50.102:995

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\01.png.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\01.png.dll,#1
      2⤵
        PID:4992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 640
          3⤵
          • Program crash
          PID:2808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4992 -ip 4992
      1⤵
        PID:3912
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Windows\system32\rundll32.exe
          rundll32 01.png.dll,Wind
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 01.png.dll,Wind
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4896
            • C:\Windows\SysWOW64\wermgr.exe
              C:\Windows\SysWOW64\wermgr.exe
              4⤵
                PID:1648
              • C:\Windows\SysWOW64\wermgr.exe
                C:\Windows\SysWOW64\wermgr.exe
                4⤵
                  PID:2040
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 352
                    5⤵
                    • Program crash
                    PID:3616
                • C:\Windows\SysWOW64\msra.exe
                  C:\Windows\SysWOW64\msra.exe
                  4⤵
                    PID:4140
              • C:\Windows\system32\rundll32.exe
                rundll32 01.png.dll,Wind
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4944
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32 01.png.dll,Wind
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:536
                  • C:\Windows\SysWOW64\wermgr.exe
                    C:\Windows\SysWOW64\wermgr.exe
                    4⤵
                      PID:4912
                    • C:\Windows\SysWOW64\wermgr.exe
                      C:\Windows\SysWOW64\wermgr.exe
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1268
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 352
                        5⤵
                        • Program crash
                        PID:1664
                    • C:\Windows\SysWOW64\msra.exe
                      C:\Windows\SysWOW64\msra.exe
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3924
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1268 -ip 1268
                1⤵
                  PID:616
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2040 -ip 2040
                  1⤵
                    PID:1048

                  Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\01.png.dll

                          Filesize

                          4KB

                          MD5

                          3b9ca5ddde25a75f39ca62634495c6a9

                          SHA1

                          154be9302723129ee69f6595e541b5d26a46d958

                          SHA256

                          f3db5491984df74e5cc08e853328b2764fb8b3a46a98315094dfb505f7cd1c1d

                          SHA512

                          9d8508b5a261d6b13ab39f78bde61d1bca726755c252651ab9953e75b4b6006e789f9443c959f0e3e15461160638c945cf162a21074b305cc78355666ccd4a92

                        • memory/536-139-0x0000000010000000-0x0000000010023000-memory.dmp

                          Filesize

                          140KB

                        • memory/3924-154-0x0000000000C00000-0x0000000000C23000-memory.dmp

                          Filesize

                          140KB

                        • memory/3924-158-0x0000000000C00000-0x0000000000C23000-memory.dmp

                          Filesize

                          140KB

                        • memory/4140-155-0x0000000000400000-0x0000000000423000-memory.dmp

                          Filesize

                          140KB

                        • memory/4140-157-0x0000000000400000-0x0000000000423000-memory.dmp

                          Filesize

                          140KB

                        • memory/4896-137-0x00000000013A0000-0x00000000013A3000-memory.dmp

                          Filesize

                          12KB

                        • memory/4896-151-0x00000000013A0000-0x00000000013A3000-memory.dmp

                          Filesize

                          12KB