Analysis
-
max time kernel
42s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2023 22:14
Behavioral task
behavioral1
Sample
old_unpacked_qbot.dll
Resource
win7-20231020-en
General
-
Target
old_unpacked_qbot.dll
-
Size
120KB
-
MD5
35927b301d9cd6c33a927b97dccf6266
-
SHA1
1ccb9ec68f0fd685a58b1b6d2e78ba3b878783da
-
SHA256
18df034ee69d675ce1b04b95569154f0e3fe41c8bd6a00e59e8dae24b41ed7f7
-
SHA512
0cbbe3dbc6fea05760801bb812a8eac2b981f55a45aa994112e822e9f8f6741ae5052bab25dd1ab29d65e4b05fe353a0c796b9f8c0ddc4d89a03c13da69e081b
-
SSDEEP
1536:DCEh82pWrjickOZol59ZJkCZuH6cYTUk8JrNZmwmIOvnToIfwsbuYkR:WH5r+ckl57J4HpYTaJBZfE/TBfwkuYk
Malware Config
Extracted
qakbot
403.2
obama125
1636625439
117.198.155.237:443
190.73.3.148:2222
63.143.92.99:995
216.238.71.31:443
216.238.72.121:995
216.238.71.31:995
216.238.72.121:443
105.198.236.99:995
136.232.34.70:443
41.37.243.129:443
140.82.49.12:443
71.13.93.154:2222
96.246.158.154:995
102.65.38.57:443
71.13.93.154:6881
123.252.190.14:443
45.9.20.200:2211
136.143.11.232:443
103.143.8.71:995
103.142.10.177:443
109.177.77.68:995
117.248.109.38:21
120.150.218.241:995
86.98.1.197:443
89.101.97.139:443
94.200.181.154:443
71.13.93.154:2083
93.48.80.198:995
96.21.251.127:2222
86.97.8.204:443
27.223.92.142:995
88.234.20.155:995
115.96.64.9:995
207.246.112.221:443
207.246.112.221:995
129.208.156.253:995
177.172.5.228:995
173.21.10.71:2222
89.137.52.44:443
83.223.164.163:443
76.25.142.196:443
73.151.236.31:443
189.135.98.193:443
71.74.12.34:443
50.194.160.233:443
187.192.70.196:80
189.223.33.109:443
93.147.212.206:443
86.8.177.143:443
50.194.160.233:32100
68.204.7.158:443
45.46.53.140:2222
65.100.174.110:8443
100.1.119.41:443
181.118.183.27:443
189.147.225.12:443
72.252.147.208:995
181.4.49.208:465
24.229.150.54:995
24.55.112.61:443
72.252.147.208:465
24.139.72.117:443
81.250.153.227:2222
78.153.126.175:443
109.12.111.14:443
197.87.182.15:443
91.178.126.51:995
108.4.67.252:443
39.49.72.230:995
146.66.139.84:443
103.116.178.85:993
182.176.180.73:443
67.165.206.193:993
75.66.88.33:443
94.110.12.148:995
79.160.207.214:443
111.250.56.31:443
189.146.127.83:443
2.222.167.138:443
94.60.254.81:443
77.57.204.78:443
75.188.35.168:443
93.48.58.123:2222
41.228.22.180:443
96.37.113.36:993
68.186.192.69:443
92.59.35.196:2222
115.186.190.72:995
86.173.96.126:443
109.133.93.127:995
80.6.192.58:443
109.228.255.59:443
176.35.109.202:2222
72.27.126.188:995
103.150.40.76:995
103.143.8.71:443
185.53.147.51:443
75.169.58.229:32100
162.244.227.34:443
216.201.162.158:443
39.52.224.170:995
188.27.119.243:443
50.194.160.233:465
73.25.109.183:2222
47.72.219.120:995
196.207.140.40:995
115.96.188.188:995
70.93.80.154:443
88.253.105.24:443
27.5.5.31:2222
212.216.213.88:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid Process 2728 regsvr32.exe 2728 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid Process 2728 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exedescription pid Process procid_target PID 3740 wrote to memory of 2728 3740 regsvr32.exe 87 PID 3740 wrote to memory of 2728 3740 regsvr32.exe 87 PID 3740 wrote to memory of 2728 3740 regsvr32.exe 87 PID 2728 wrote to memory of 1336 2728 regsvr32.exe 91 PID 2728 wrote to memory of 1336 2728 regsvr32.exe 91 PID 2728 wrote to memory of 1336 2728 regsvr32.exe 91 PID 2728 wrote to memory of 1336 2728 regsvr32.exe 91 PID 2728 wrote to memory of 1336 2728 regsvr32.exe 91 PID 1336 wrote to memory of 116 1336 explorer.exe 93 PID 1336 wrote to memory of 116 1336 explorer.exe 93 PID 1336 wrote to memory of 116 1336 explorer.exe 93
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\old_unpacked_qbot.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\old_unpacked_qbot.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn miyhhsfvd /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\old_unpacked_qbot.dll\"" /SC ONCE /Z /ST 22:16 /ET 22:284⤵
- Creates scheduled task(s)
PID:116
-
-
-