Analysis

  • max time kernel
    141s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2023, 13:20

General

  • Target

    run.bat

  • Size

    22B

  • MD5

    7982f3323acdaed4489c85a01440ae87

  • SHA1

    746dbd816277a21b6805a3ac7defd12a26465e30

  • SHA256

    35cf33e0a4d9265c233f27095b90b93b1083a97f68295102266edee608045543

  • SHA512

    0babfc6388260f933e40397c4ae1a7289feb22f326f5da7f3d2cc78589c09e6aed3b6da43cd47330ead65ce8a65a3b392e103b70d1a2b62a921679fa0e217650

Malware Config

Extracted

Family

qakbot

Version

404.843

Botnet

BB21

Campaign

1680106938

C2

94.30.31.47:50000

72.88.245.71:443

136.35.241.159:443

74.92.243.115:50000

47.196.225.236:443

71.46.234.171:443

50.68.204.71:443

78.130.215.67:443

46.64.171.68:443

92.186.69.229:2222

68.173.170.110:8443

75.90.87.37:995

94.30.98.134:32100

24.236.90.196:2078

162.248.14.107:443

72.203.216.98:2222

67.219.197.94:443

78.69.251.252:2222

50.68.204.71:993

174.4.89.3:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\run.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Windows\system32\rundll32.exe
      rundll32 dll.dll,X555
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 dll.dll,X555
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Windows\SysWOW64\wermgr.exe
          C:\Windows\SysWOW64\wermgr.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1500

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1448-54-0x0000000010000000-0x000000001005F000-memory.dmp

          Filesize

          380KB

        • memory/1448-59-0x0000000010000000-0x000000001005F000-memory.dmp

          Filesize

          380KB

        • memory/1448-61-0x0000000010000000-0x000000001005F000-memory.dmp

          Filesize

          380KB

        • memory/1500-60-0x0000000000120000-0x0000000000122000-memory.dmp

          Filesize

          8KB

        • memory/1500-62-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB

        • memory/1500-63-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB

        • memory/1500-64-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB

        • memory/1500-65-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB

        • memory/1500-67-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB

        • memory/1500-66-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB

        • memory/1500-68-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB

        • memory/1500-69-0x00000000000C0000-0x000000000011F000-memory.dmp

          Filesize

          380KB