Analysis

  • max time kernel
    607s
  • max time network
    617s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    18-04-2024 06:45

General

  • Target

    02.dll

  • Size

    3.5MB

  • MD5

    4b7b85d70329e085ab06dcdf9557b0a0

  • SHA1

    3a277203cb4916eb1f55f867f0bd368476c613fb

  • SHA256

    49220571574da61781de37f35c66e8f0dadb18fdedb6d3a1be67485069cfd4b0

  • SHA512

    50087b509b58a50db0a67f2aea2838c2783fb2d1d6f5a22d3a68b31e0cdfa7b3b5d469df16af437a6396d3f8dc75fafd689f9af9ce72bfb0c541a3f37ef77f03

  • SSDEEP

    49152:Js0ewfW1oFguIXFkCEDeQi5LpAO85kDe8MS6pBAuowCSHeuOz8eoY3qtI:vfWzuEKCh91Bw8HFwCS+uXevq

Malware Config

Extracted

Family

qakbot

Botnet

tchk08

Campaign

1710958492

C2

77.105.162.176:995

31.210.173.10:443

5.252.177.195:443

Attributes
  • camp_date

    2024-03-20 18:14:52 +0000 UTC

Signatures

  • Detect Qakbot Payload 57 IoCs
  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\02.dll,checkit
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\System32\wermgr.exe
      C:\Windows\System32\wermgr.exe
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\System32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:4976
      • C:\Windows\System32\whoami.exe
        whoami /all
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1660
      • C:\Windows\System32\nltest.exe
        nltest /domain_trusts /all_trusts
        3⤵
          PID:2928
        • C:\Windows\System32\qwinsta.exe
          qwinsta
          3⤵
            PID:2340
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4852

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2896-54-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-51-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-103-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-100-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-99-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-98-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-55-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-97-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-94-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-12-0x0000020853A10000-0x0000020853A12000-memory.dmp

        Filesize

        8KB

      • memory/2896-13-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-93-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-92-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-21-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-91-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-22-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-24-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-33-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-34-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-36-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-35-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-37-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-38-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-47-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-50-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-60-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-88-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-53-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-52-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-87-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-86-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-61-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-62-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-63-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-66-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-67-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-68-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-69-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-72-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-73-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-74-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-75-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-78-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-79-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-81-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-82-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/2896-85-0x00000208539E0000-0x0000020853A0F000-memory.dmp

        Filesize

        188KB

      • memory/4304-1-0x000001843E6A0000-0x000001843E6CF000-memory.dmp

        Filesize

        188KB

      • memory/4304-9-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-0-0x000001843CF60000-0x000001843CF8D000-memory.dmp

        Filesize

        180KB

      • memory/4304-23-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-20-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-19-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-10-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-11-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-8-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-7-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-6-0x000001843E6F0000-0x000001843E71F000-memory.dmp

        Filesize

        188KB

      • memory/4304-2-0x000001843CF60000-0x000001843CF8D000-memory.dmp

        Filesize

        180KB