Analysis

  • max time kernel
    77s
  • max time network
    79s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2023 15:27

General

  • Target

    borisOnAFriday.dll

  • Size

    727KB

  • MD5

    6f230becbd350c5a3cc0244f4f59ee76

  • SHA1

    acc11106eec7d658d14a56348026aefc63379700

  • SHA256

    3a38dd8fef9262545f0a3f4d1798673e74d20a43b5e15c96d3427d9e767d3de1

  • SHA512

    cd37cba59458b2c7e1c642cfcbb98b7e8b8584d2614379e5bf8bf3e82ebcddc534d597f18d59d33266b9fcb5b9c0e7a06db38d51705d10d43840517e76faac62

  • SSDEEP

    12288:zDxy+2MIBYYimb3oG11xfTUUk0uU7/GQ4vbnWj6TN:Pg+2MIBYkb4G11hTQ05bGM

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

BB30

Campaign

1685686808

C2

86.173.2.12:2222

92.9.45.20:2222

100.4.163.158:2222

213.64.33.92:2222

75.98.154.19:443

78.192.109.105:2222

88.126.94.4:50000

70.28.50.223:2083

92.154.17.149:2222

24.234.220.88:993

87.252.106.39:995

174.4.89.3:443

12.172.173.82:20

90.29.86.138:2222

70.160.67.203:443

223.166.13.95:995

184.181.75.148:443

95.45.50.93:2222

201.143.215.69:443

64.121.161.102:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\borisOnAFriday.dll,next
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\borisOnAFriday.dll,next
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\wermgr.exe
        C:\Windows\SysWOW64\wermgr.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-133-0x0000000000910000-0x0000000000913000-memory.dmp

    Filesize

    12KB

  • memory/1684-134-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB

  • memory/1684-147-0x000000006AD80000-0x000000006AE22000-memory.dmp

    Filesize

    648KB

  • memory/2588-139-0x0000000001200000-0x0000000001202000-memory.dmp

    Filesize

    8KB

  • memory/2588-140-0x0000000000FD0000-0x0000000000FF4000-memory.dmp

    Filesize

    144KB

  • memory/2588-146-0x0000000000FD0000-0x0000000000FF4000-memory.dmp

    Filesize

    144KB

  • memory/2588-148-0x0000000000FD0000-0x0000000000FF4000-memory.dmp

    Filesize

    144KB

  • memory/2588-149-0x0000000000FD0000-0x0000000000FF4000-memory.dmp

    Filesize

    144KB

  • memory/2588-150-0x0000000000FD0000-0x0000000000FF4000-memory.dmp

    Filesize

    144KB

  • memory/2588-151-0x0000000000FD0000-0x0000000000FF4000-memory.dmp

    Filesize

    144KB