Resubmissions

27-04-2023 15:16

230427-snnnyagc97 3

30-03-2023 10:31

230330-mkr93adg3s 10

Analysis

  • max time kernel
    71s
  • max time network
    70s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2023 10:31

General

  • Target

    Beinked.Funkias.dll

  • Size

    556KB

  • MD5

    c9ab1cd04e796fd7f084a1dd2d40cc2d

  • SHA1

    f05b2066a375a5c8d3dfc44d6097f577cd4f0255

  • SHA256

    d7608b8f684e7465599a4673fefa329de646e38d934dd79e592288c68720bcfa

  • SHA512

    ad974a30ac9e5915cb221db1c07fbaaa2d7b7f9a820841c62e887347abec76e8b626d97cfca6fb386a74f2f4bc89a4c484e46cc585770cd215e357eca0b13d9c

  • SSDEEP

    12288:0sqXe4DNX3lWA38yEDJQTiaQS8LztCYKH5t3XjMjDW:vqXeSNX3lWA3DEeCLcYKbIj

Malware Config

Extracted

Family

qakbot

Version

404.843

Botnet

BB21

Campaign

1680106938

C2

94.30.31.47:50000

72.88.245.71:443

136.35.241.159:443

74.92.243.115:50000

47.196.225.236:443

71.46.234.171:443

50.68.204.71:443

78.130.215.67:443

46.64.171.68:443

92.186.69.229:2222

68.173.170.110:8443

75.90.87.37:995

94.30.98.134:32100

24.236.90.196:2078

162.248.14.107:443

72.203.216.98:2222

67.219.197.94:443

78.69.251.252:2222

50.68.204.71:993

174.4.89.3:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Beinked.Funkias.dll,X555
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Beinked.Funkias.dll,X555
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Windows\SysWOW64\wermgr.exe
        C:\Windows\SysWOW64\wermgr.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3848-141-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/3848-142-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/3848-143-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/3848-144-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/3848-145-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/3848-146-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/3848-147-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/3848-148-0x0000000000B40000-0x0000000000B9F000-memory.dmp
    Filesize

    380KB

  • memory/4676-133-0x0000000010000000-0x000000001005F000-memory.dmp
    Filesize

    380KB

  • memory/4676-138-0x0000000010000000-0x000000001005F000-memory.dmp
    Filesize

    380KB

  • memory/4676-139-0x0000000002790000-0x000000000279E000-memory.dmp
    Filesize

    56KB

  • memory/4676-140-0x0000000010000000-0x000000001005F000-memory.dmp
    Filesize

    380KB