Malware Analysis Report

2024-11-13 17:05

Sample ID 230607-ybl78sff2w
Target 3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81
SHA256 3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81
Tags
qakbot obama267 1686127648 banker stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81

Threat Level: Known bad

The file 3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81 was found to be: Known bad.

Malicious Activity Summary

qakbot obama267 1686127648 banker stealer trojan

Qakbot/Qbot

Unsigned PE

Program crash

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-06-07 19:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-06-07 19:36

Reported

2023-06-07 19:37

Platform

win7-20230220-en

Max time kernel

31s

Max time network

30s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 224

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-06-07 19:36

Reported

2023-06-07 19:39

Platform

win10v2004-20230220-en

Max time kernel

152s

Max time network

154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81.dll,#1

Signatures

Qakbot/Qbot

trojan banker stealer qakbot

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\3d696100adab4005b28c06b231ab5096c999420794d39bb83f824a144ee11a81.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4220 -ip 4220

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 600

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\rundll32.exe

rundll32.exe 3.dll,menu

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe 3.dll,menu

C:\Windows\SysWOW64\wermgr.exe

C:\Windows\SysWOW64\wermgr.exe

Network

Country Destination Domain Proto
US 52.242.101.226:443 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 52.242.101.226:443 tcp
US 8.8.8.8:53 14.103.197.20.in-addr.arpa udp
US 52.242.101.226:443 tcp
US 20.189.173.15:443 tcp
US 52.242.101.226:443 tcp
US 204.79.197.203:80 api.msn.com tcp
US 52.242.101.226:443 tcp
US 8.247.210.254:80 tcp
US 8.8.8.8:53 45.8.109.52.in-addr.arpa udp
US 52.242.101.226:443 tcp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp
US 52.242.101.226:443 tcp

Files

memory/4140-133-0x0000000000620000-0x0000000000623000-memory.dmp

memory/4140-134-0x0000000000D70000-0x0000000000D94000-memory.dmp

memory/780-139-0x0000000000600000-0x0000000000602000-memory.dmp

memory/780-140-0x00000000003D0000-0x00000000003F4000-memory.dmp

memory/780-146-0x00000000003D0000-0x00000000003F4000-memory.dmp

memory/780-147-0x00000000003D0000-0x00000000003F4000-memory.dmp

memory/780-148-0x00000000003D0000-0x00000000003F4000-memory.dmp

memory/780-149-0x00000000003D0000-0x00000000003F4000-memory.dmp

memory/780-150-0x00000000003D0000-0x00000000003F4000-memory.dmp