Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 22:20

General

  • Target

    third_carved_dll.dll

  • Size

    166KB

  • MD5

    07dfe6aed5e353c8d4cc0ab026c63e3e

  • SHA1

    29fe5ec300aa7e3b5124a223eafaa0c7df39db56

  • SHA256

    110423a9555f7aba13483288abdb3badc6194dc01f825bfe1be174d506625efb

  • SHA512

    7d165bc271fde6a07d65400f4175eaa12710bb4219cb24085b67cfa7559352df9d7dd08814a42f2b17d1b888e7b43093a8d6ad630eb0eb6bfe97014a6ef0bb8a

  • SSDEEP

    3072:9ixYRIgVFK9cJx2I87ZMGCDaZqZu9E/gVAE/dxwtJBdw:9ixYVVQ9G2I8ZMGjZqY9EcAWUB6

Malware Config

Extracted

Family

qakbot

Botnet

tchk06

Campaign

1702463600

C2

45.138.74.191:443

65.108.218.24:443

Attributes
  • camp_date

    2023-12-13 10:33:20 +0000 UTC

Signatures

  • Detect Qakbot Payload 8 IoCs
  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\third_carved_dll.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\System32\wermgr.exe
      C:\Windows\System32\wermgr.exe
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2076-0-0x0000000000090000-0x0000000000092000-memory.dmp
    Filesize

    8KB

  • memory/2076-1-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB

  • memory/2076-7-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB

  • memory/2076-20-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB

  • memory/2076-21-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB

  • memory/2076-22-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB

  • memory/2076-23-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB

  • memory/2076-24-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB

  • memory/2076-27-0x0000000000060000-0x000000000008E000-memory.dmp
    Filesize

    184KB