Analysis

  • max time kernel
    91s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/02/2023, 14:59

General

  • Target

    333863.dll

  • Size

    582KB

  • MD5

    7513afc52fc4421c498a9d5ff1607750

  • SHA1

    c9d3be2070c16bd8f1f54db00b5f92247f15c1ee

  • SHA256

    54061fc117b91523f83617597c62c51923d157a760bc4a77cb840940c2f5a138

  • SHA512

    502e8577d9ba91d7c2389a444de227955021bf60477d85ea4729fda146dfd577da798d0cfafd591832797d52754997fde14cb7890c687cdb68413eed6bdb900c

  • SSDEEP

    12288:GZa7ZPnVubJS4NjeWC58NyBeLnr2zlTzZ:Ke5VuY1H8NGbTV

Malware Config

Extracted

Family

qakbot

Version

404.510

Botnet

tzr06

Campaign

1676466541

C2

82.127.204.82:2222

183.87.163.165:443

50.68.204.71:443

162.248.14.107:443

75.98.154.19:443

86.130.9.232:2222

108.2.111.66:995

85.241.180.94:443

109.150.179.236:2222

73.29.92.128:443

190.206.75.58:2222

12.172.173.82:50001

35.143.97.145:995

174.104.184.149:443

12.172.173.82:995

76.170.252.153:995

73.161.176.218:443

65.190.242.244:443

87.202.101.164:50000

76.64.202.44:2222

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\333863.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\333863.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2380
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 620
        3⤵
        • Program crash
        PID:4720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2380 -ip 2380
    1⤵
      PID:3992

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2380-133-0x0000000000CC0000-0x0000000000D54000-memory.dmp

      Filesize

      592KB

    • memory/2380-134-0x0000000002360000-0x0000000002383000-memory.dmp

      Filesize

      140KB

    • memory/2380-135-0x0000000000DD0000-0x0000000000DF4000-memory.dmp

      Filesize

      144KB

    • memory/2380-136-0x0000000002360000-0x0000000002383000-memory.dmp

      Filesize

      140KB