Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2023 02:28

General

  • Target

    qak.dll

  • Size

    496KB

  • MD5

    179d4849f8d096122d05de3c7bebb4bd

  • SHA1

    ee3ead69ec6801721cde4ca6480f30ecff948c08

  • SHA256

    2f6ae770a5d56ed8a2cfe262e196363b5c80e58468c66ff36cdf9c75306c2c55

  • SHA512

    f449ac3cba0d31168328f3e0af94bb91f2f2d1c2a9ec3e4200d4f946973a2ac34bc3e42f10fa03c433d1eb89f131e39ada44f2cc921c836b35e56efeac62cdfe

  • SSDEEP

    12288:W5XwIjvPgzGgQChM5u/7hIYArytfqYsgzelZ7CPZUeQ58:njhhArytfqYsgalZWPRQ58

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

BB31

Campaign

1685959443

C2

77.126.99.230:443

24.234.220.88:465

151.62.238.176:443

85.57.212.13:3389

199.27.66.213:443

12.172.173.82:21

12.172.173.82:50001

12.172.173.82:465

105.184.209.117:995

193.80.73.200:995

86.208.35.220:2222

93.187.148.45:995

37.189.89.196:443

182.75.189.42:995

65.95.141.84:2222

84.216.198.201:6881

105.102.10.220:443

124.246.122.199:2222

83.249.198.100:2222

1.221.179.74:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\qak.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\qak.dll,#1
      2⤵
        PID:1908
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:824
      • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp'
        1⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" .\qak.dll,next
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" .\qak.dll,next
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2152
            • C:\Windows\SysWOW64\wermgr.exe
              C:\Windows\SysWOW64\wermgr.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4036

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_duffywp5.pbc.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2152-156-0x00000000005E0000-0x00000000005E3000-memory.dmp

        Filesize

        12KB

      • memory/2152-157-0x0000000002230000-0x0000000002254000-memory.dmp

        Filesize

        144KB

      • memory/2164-153-0x000001BDEE250000-0x000001BDEE260000-memory.dmp

        Filesize

        64KB

      • memory/2164-145-0x000001BDEE250000-0x000001BDEE260000-memory.dmp

        Filesize

        64KB

      • memory/2164-148-0x000001BDEE250000-0x000001BDEE260000-memory.dmp

        Filesize

        64KB

      • memory/2164-149-0x000001BDEFC80000-0x000001BDEFCF6000-memory.dmp

        Filesize

        472KB

      • memory/2164-150-0x000001BDEE220000-0x000001BDEE23E000-memory.dmp

        Filesize

        120KB

      • memory/2164-151-0x000001BDEE250000-0x000001BDEE260000-memory.dmp

        Filesize

        64KB

      • memory/2164-152-0x000001BDEE250000-0x000001BDEE260000-memory.dmp

        Filesize

        64KB

      • memory/2164-135-0x000001BDEE0A0000-0x000001BDEE0C2000-memory.dmp

        Filesize

        136KB

      • memory/2164-146-0x000001BDEE250000-0x000001BDEE260000-memory.dmp

        Filesize

        64KB

      • memory/2164-147-0x000001BDEFBB0000-0x000001BDEFBF4000-memory.dmp

        Filesize

        272KB

      • memory/4036-162-0x0000000000C30000-0x0000000000C32000-memory.dmp

        Filesize

        8KB

      • memory/4036-163-0x0000000000C00000-0x0000000000C24000-memory.dmp

        Filesize

        144KB

      • memory/4036-169-0x0000000000C00000-0x0000000000C24000-memory.dmp

        Filesize

        144KB

      • memory/4036-170-0x0000000000C00000-0x0000000000C24000-memory.dmp

        Filesize

        144KB

      • memory/4036-171-0x0000000000C00000-0x0000000000C24000-memory.dmp

        Filesize

        144KB

      • memory/4036-172-0x0000000000C00000-0x0000000000C24000-memory.dmp

        Filesize

        144KB

      • memory/4036-173-0x0000000000C00000-0x0000000000C24000-memory.dmp

        Filesize

        144KB