Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 19:06

General

  • Target

    c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll

  • Size

    543KB

  • MD5

    ffaf9cd085434fd5230511ab895ba494

  • SHA1

    9e49d29d66d380255e5e8e2ccf19f5b51eb92001

  • SHA256

    c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a

  • SHA512

    01890758e839b3eb90dc3711dd470ba1e232798ed0f62d89185e450877161fd321b5b125ab0a64f270c2f37ef129f59eb5848164d26fb4965534d77a0d4f2300

  • SSDEEP

    12288:DSG3daX8glK/McVThyhRBof4byx7ILypuLT+CLWNhM3Q2Bz:DSc3l/ML3bypxOT+CLsu

Malware Config

Extracted

Family

qakbot

Version

403.573

Botnet

AA

Campaign

1649660679

C2

41.228.22.180:443

47.23.89.62:995

176.67.56.94:443

103.107.113.120:443

148.64.96.100:443

47.180.172.159:443

181.118.183.98:443

140.82.49.12:443

103.87.95.133:2222

96.21.251.127:2222

197.167.62.14:993

46.107.48.202:443

24.43.99.75:443

172.115.177.204:2222

80.11.74.81:2222

66.98.42.102:443

75.99.168.194:61201

173.174.216.62:443

45.9.20.200:443

39.41.158.185:995

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn dlkzihzrjy /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll\"" /SC ONCE /Z /ST 19:08 /ET 19:20
          4⤵
          • Creates scheduled task(s)
          PID:2144
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {1D31A009-27C2-42B5-9977-BC4C8D736053} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2176
  • C:\Windows\SysWOW64\regsvr32.exe
    -s "C:\Users\Admin\AppData\Local\Temp\c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\system32\reg.exe
        C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Jjiewipouh" /d "0"
        3⤵
        • Windows security bypass
        PID:804
      • C:\Windows\system32\reg.exe
        C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Wjtwty" /d "0"
        3⤵
        • Windows security bypass
        PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll

    Filesize

    543KB

    MD5

    ffaf9cd085434fd5230511ab895ba494

    SHA1

    9e49d29d66d380255e5e8e2ccf19f5b51eb92001

    SHA256

    c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a

    SHA512

    01890758e839b3eb90dc3711dd470ba1e232798ed0f62d89185e450877161fd321b5b125ab0a64f270c2f37ef129f59eb5848164d26fb4965534d77a0d4f2300

  • memory/1620-23-0x0000000000080000-0x000000000010F000-memory.dmp

    Filesize

    572KB

  • memory/1620-18-0x0000000000080000-0x000000000010F000-memory.dmp

    Filesize

    572KB

  • memory/1620-19-0x0000000000080000-0x000000000010F000-memory.dmp

    Filesize

    572KB

  • memory/1620-20-0x0000000000080000-0x000000000010F000-memory.dmp

    Filesize

    572KB

  • memory/1620-21-0x0000000000080000-0x000000000010F000-memory.dmp

    Filesize

    572KB

  • memory/1620-17-0x0000000000080000-0x000000000010F000-memory.dmp

    Filesize

    572KB

  • memory/2184-6-0x00000000000F0000-0x000000000017F000-memory.dmp

    Filesize

    572KB

  • memory/2184-10-0x00000000000F0000-0x000000000017F000-memory.dmp

    Filesize

    572KB

  • memory/2184-8-0x00000000000F0000-0x000000000017F000-memory.dmp

    Filesize

    572KB

  • memory/2184-7-0x00000000000F0000-0x000000000017F000-memory.dmp

    Filesize

    572KB

  • memory/2184-0-0x0000000000080000-0x0000000000082000-memory.dmp

    Filesize

    8KB

  • memory/2184-5-0x00000000000F0000-0x000000000017F000-memory.dmp

    Filesize

    572KB

  • memory/2184-2-0x00000000000F0000-0x000000000017F000-memory.dmp

    Filesize

    572KB