Resubmissions

27-04-2023 15:16

230427-snnnyagc97 3

30-03-2023 10:31

230330-mkr93adg3s 10

Analysis

  • max time kernel
    72s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2023 10:31

General

  • Target

    Beinked.Funkias.dll

  • Size

    556KB

  • MD5

    c9ab1cd04e796fd7f084a1dd2d40cc2d

  • SHA1

    f05b2066a375a5c8d3dfc44d6097f577cd4f0255

  • SHA256

    d7608b8f684e7465599a4673fefa329de646e38d934dd79e592288c68720bcfa

  • SHA512

    ad974a30ac9e5915cb221db1c07fbaaa2d7b7f9a820841c62e887347abec76e8b626d97cfca6fb386a74f2f4bc89a4c484e46cc585770cd215e357eca0b13d9c

  • SSDEEP

    12288:0sqXe4DNX3lWA38yEDJQTiaQS8LztCYKH5t3XjMjDW:vqXeSNX3lWA3DEeCLcYKbIj

Malware Config

Extracted

Family

qakbot

Version

404.843

Botnet

BB21

Campaign

1680106938

C2

94.30.31.47:50000

72.88.245.71:443

136.35.241.159:443

74.92.243.115:50000

47.196.225.236:443

71.46.234.171:443

50.68.204.71:443

78.130.215.67:443

46.64.171.68:443

92.186.69.229:2222

68.173.170.110:8443

75.90.87.37:995

94.30.98.134:32100

24.236.90.196:2078

162.248.14.107:443

72.203.216.98:2222

67.219.197.94:443

78.69.251.252:2222

50.68.204.71:993

174.4.89.3:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Beinked.Funkias.dll,X555
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Beinked.Funkias.dll,X555
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\SysWOW64\wermgr.exe
        C:\Windows\SysWOW64\wermgr.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1020-61-0x0000000000080000-0x0000000000082000-memory.dmp
    Filesize

    8KB

  • memory/1020-63-0x0000000000170000-0x00000000001CF000-memory.dmp
    Filesize

    380KB

  • memory/1020-64-0x0000000000170000-0x00000000001CF000-memory.dmp
    Filesize

    380KB

  • memory/1020-65-0x0000000000170000-0x00000000001CF000-memory.dmp
    Filesize

    380KB

  • memory/1020-66-0x0000000000170000-0x00000000001CF000-memory.dmp
    Filesize

    380KB

  • memory/1020-67-0x0000000000170000-0x00000000001CF000-memory.dmp
    Filesize

    380KB

  • memory/1020-68-0x0000000000170000-0x00000000001CF000-memory.dmp
    Filesize

    380KB

  • memory/1020-70-0x0000000000170000-0x00000000001CF000-memory.dmp
    Filesize

    380KB

  • memory/1484-54-0x0000000010000000-0x000000001005F000-memory.dmp
    Filesize

    380KB

  • memory/1484-59-0x0000000010000000-0x000000001005F000-memory.dmp
    Filesize

    380KB

  • memory/1484-60-0x00000000000B0000-0x00000000000B3000-memory.dmp
    Filesize

    12KB

  • memory/1484-62-0x0000000010000000-0x000000001005F000-memory.dmp
    Filesize

    380KB