Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2023 15:02

General

  • Target

    qbot.bat

  • Size

    26B

  • MD5

    2aabd1a3d885eaf151f9fc101ea1caab

  • SHA1

    6fcf6a07c0f9a23826bab9fd4da093ed4757019c

  • SHA256

    9ae4c3b9e654237f9d62c93dbd242ed64abe72451e7d142724bfea801cd6c4de

  • SHA512

    9df02859f59a52d216f80b9627bf6d43eac8762120701625d39ef52bed7343d4b32b9596070533593f7eeecd5f134d8dfbe14117ea6ea9378908cbf4692b8da0

Malware Config

Extracted

Family

qakbot

Version

404.1358

Botnet

obama267

Campaign

1686127648

C2

161.142.100.114:995

116.75.63.15:443

125.99.76.102:443

93.187.148.45:443

79.168.224.165:2222

31.53.29.216:2222

103.123.223.133:443

62.35.230.21:995

124.149.143.189:2222

109.50.149.241:2222

86.222.101.244:2222

45.62.70.33:443

24.234.220.88:995

201.244.108.183:995

190.75.134.240:2222

103.212.19.254:995

184.182.66.109:443

64.121.161.102:443

178.175.187.254:443

94.59.123.30:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\qbot.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\system32\rundll32.exe
      rundll32.exe qbot.dll,menu
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe qbot.dll,menu
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\SysWOW64\wermgr.exe
          C:\Windows\SysWOW64\wermgr.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-133-0x00000000013F0000-0x00000000013F3000-memory.dmp

    Filesize

    12KB

  • memory/2200-134-0x0000000001400000-0x0000000001424000-memory.dmp

    Filesize

    144KB

  • memory/3492-139-0x0000000000A60000-0x0000000000A62000-memory.dmp

    Filesize

    8KB

  • memory/3492-140-0x0000000000A30000-0x0000000000A54000-memory.dmp

    Filesize

    144KB

  • memory/3492-146-0x0000000000A30000-0x0000000000A54000-memory.dmp

    Filesize

    144KB

  • memory/3492-147-0x0000000000A30000-0x0000000000A54000-memory.dmp

    Filesize

    144KB

  • memory/3492-148-0x0000000000A30000-0x0000000000A54000-memory.dmp

    Filesize

    144KB

  • memory/3492-149-0x0000000000A30000-0x0000000000A54000-memory.dmp

    Filesize

    144KB

  • memory/3492-150-0x0000000000A30000-0x0000000000A54000-memory.dmp

    Filesize

    144KB

  • memory/3492-153-0x0000000000A30000-0x0000000000A54000-memory.dmp

    Filesize

    144KB