Analysis

  • max time kernel
    149s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2023 18:09

General

  • Target

    anything.dll

  • Size

    727KB

  • MD5

    8d7ff15c2f8af73bfdac8d72726dff80

  • SHA1

    76f8eff2e4a137b30431c72c49a0ef99dc8488dd

  • SHA256

    fe36a39bb9bf065632e3f4c7c953313f650e6b4a764c9273c6c724e1e059cf0a

  • SHA512

    fc091c0cae352002a1ad566f9f44f46d07f5e1a427748a75561af86f7e7800f9b8a6598ad9ab2733824a445b642c3a34e6ef7e704a61626372f76b67273e373f

  • SSDEEP

    12288:zDxy+2MIBYYimb3oG11xfTUUk0uU7/GQ4vbnWj62N:Pg+2MIBYkb4G11hTQ05bGM

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

BB30

Campaign

1685686808

C2

86.173.2.12:2222

92.9.45.20:2222

100.4.163.158:2222

213.64.33.92:2222

75.98.154.19:443

78.192.109.105:2222

88.126.94.4:50000

70.28.50.223:2083

92.154.17.149:2222

24.234.220.88:993

87.252.106.39:995

174.4.89.3:443

12.172.173.82:20

90.29.86.138:2222

70.160.67.203:443

223.166.13.95:995

184.181.75.148:443

95.45.50.93:2222

201.143.215.69:443

64.121.161.102:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\anything.dll,next
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\anything.dll,next
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\wermgr.exe
        C:\Windows\SysWOW64\wermgr.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:564

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/564-62-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/564-61-0x00000000000B0000-0x00000000000B2000-memory.dmp

    Filesize

    8KB

  • memory/564-68-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/564-70-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/564-71-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/564-72-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/564-73-0x0000000000080000-0x00000000000A4000-memory.dmp

    Filesize

    144KB

  • memory/1572-54-0x00000000001A0000-0x00000000001A3000-memory.dmp

    Filesize

    12KB

  • memory/1572-55-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB

  • memory/1572-60-0x000000006AD80000-0x000000006AE22000-memory.dmp

    Filesize

    648KB

  • memory/1572-69-0x000000006AD80000-0x000000006AE22000-memory.dmp

    Filesize

    648KB