Analysis

  • max time kernel
    1200s
  • max time network
    1183s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2023 15:31

General

  • Target

    cropped.dll

  • Size

    840KB

  • MD5

    1b8277899d678d98cda66bccdcb8a64c

  • SHA1

    e401df5cbf16b3500afe39a0199e50359409b731

  • SHA256

    6bac623521bd145f87812a0084a3d979f3d8cdec234bc618fd677877b7798839

  • SHA512

    f09abd7b89808374c458ca5a89c917db21f9e5270637874008f3bea883a571124d9ea81ec325de1b77bc438a6e94dfa7741fec1642dbd68d5e93edf2235d28c9

  • SSDEEP

    12288:ovXYcP7kXn89DhAw1aUN3RFEycMFSDXxqEbHXeL/Lt72G3O0ch:mvTkXnyD6ORDccmEs3M/Lt72G3O0

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

BB30

Campaign

1685604052

C2

47.199.241.39:443

93.147.235.8:443

75.141.227.169:443

45.243.142.31:995

79.92.15.6:443

85.104.105.67:443

89.129.109.27:2222

86.176.83.44:2222

24.234.220.88:993

89.32.156.5:995

12.172.173.82:22

103.101.203.177:443

70.28.50.223:2083

98.187.21.2:443

70.49.205.198:2222

96.56.197.26:2222

92.9.45.20:2222

86.195.14.72:2222

172.115.17.50:443

100.4.163.158:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cropped.dll,next
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cropped.dll,next
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\wermgr.exe
        C:\Windows\SysWOW64\wermgr.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          4⤵
          • Gathers network information
          PID:804
        • C:\Windows\SysWOW64\whoami.exe
          whoami /all
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1756
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar1962.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/1744-55-0x0000000000260000-0x0000000000284000-memory.dmp

    Filesize

    144KB

  • memory/1744-54-0x0000000000170000-0x0000000000173000-memory.dmp

    Filesize

    12KB

  • memory/1948-725-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-1374-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-69-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-781-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-71-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-75-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-76-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-78-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-67-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-60-0x00000000000B0000-0x00000000000B2000-memory.dmp

    Filesize

    8KB

  • memory/1948-612-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-613-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-614-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-657-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-723-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-724-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-61-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-758-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-70-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-68-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-784-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-783-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-785-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-792-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-815-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-816-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-817-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-819-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-829-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-852-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-853-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-854-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-856-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-1350-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-1373-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-782-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1948-1375-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB