Analysis

  • max time kernel
    132s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2024 02:08

General

  • Target

    a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095.dll

  • Size

    1021KB

  • MD5

    2b2414cb1347bb45aa2f46cc01cf7185

  • SHA1

    99c4632185f311155893b48140a16a64abda7389

  • SHA256

    a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095

  • SHA512

    c8c11cffdec32f6efaa970f60dc5946f93dd6ac0400e6236dacdab2d9d3db5f2fdf5c2f115d30e4913657b2309d76a561617337d97fd1848e37b556ebb685e54

  • SSDEEP

    24576:m2Pr19Y4JpqPcKwlhgaJmJxA9mFbbLIk:m6tJpq7KJmzNIk

Malware Config

Extracted

Family

qakbot

Version

401.194

Botnet

biden12

Campaign

1615580905

C2

24.229.150.54:995

109.12.111.14:443

173.21.10.71:2222

81.214.126.173:2222

75.118.1.141:443

98.252.118.134:443

71.74.12.34:443

186.31.77.42:443

81.97.154.100:443

71.117.132.169:443

24.139.72.117:443

67.165.206.193:993

106.51.52.111:443

47.196.192.184:443

71.197.126.250:443

24.95.61.62:443

47.22.148.6:443

195.12.154.8:443

71.163.223.159:443

197.45.110.165:995

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn hcemxkhvy /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095.dll\"" /SC ONCE /Z /ST 02:10 /ET 02:22
          4⤵
          • Creates scheduled task(s)
          PID:2680
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4B9C9DF4-165F-401D-9269-8F265540F9B1} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\Users\Admin\AppData\Local\Temp\a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095.dll"
        3⤵
        • Loads dropped DLL
        PID:624

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a8d61f6470d234ea63c4ffe0321e8f6e642dc3453ba1fae79a7130a36b896095.dll
    Filesize

    1021KB

    MD5

    4d191ba180e2d378cd05ace59f469f93

    SHA1

    42f1f18f1b1c863f3cec5583297eece6b2b5a4cb

    SHA256

    22af73f4086f9d686a8f064842ea43cf3415c05e8b26a54cba33e6b659546e8d

    SHA512

    78bc1ae3919a68261c2b723b31ae5b27e9639607df51534584704a88c8c27cd398aab839b35882d939a882cc8b626100df3b06a41e57b3c255e9a40f3f3e7cf6

  • memory/1984-11-0x0000000000080000-0x00000000000BB000-memory.dmp
    Filesize

    236KB

  • memory/1984-14-0x0000000000080000-0x00000000000BB000-memory.dmp
    Filesize

    236KB

  • memory/1984-17-0x0000000000080000-0x00000000000BB000-memory.dmp
    Filesize

    236KB

  • memory/1984-15-0x0000000000080000-0x00000000000BB000-memory.dmp
    Filesize

    236KB

  • memory/1984-6-0x00000000000C0000-0x00000000000C2000-memory.dmp
    Filesize

    8KB

  • memory/1984-9-0x00000000008C0000-0x0000000000B41000-memory.dmp
    Filesize

    2.5MB

  • memory/1984-13-0x0000000000080000-0x00000000000BB000-memory.dmp
    Filesize

    236KB

  • memory/2092-10-0x0000000000A70000-0x0000000000AAB000-memory.dmp
    Filesize

    236KB

  • memory/2092-0-0x0000000000960000-0x0000000000A62000-memory.dmp
    Filesize

    1.0MB

  • memory/2092-8-0x0000000000960000-0x0000000000A62000-memory.dmp
    Filesize

    1.0MB

  • memory/2092-2-0x0000000000220000-0x0000000000259000-memory.dmp
    Filesize

    228KB

  • memory/2092-5-0x0000000000A70000-0x0000000000AAB000-memory.dmp
    Filesize

    236KB

  • memory/2092-3-0x0000000000A70000-0x0000000000AAB000-memory.dmp
    Filesize

    236KB

  • memory/2092-1-0x0000000000180000-0x0000000000181000-memory.dmp
    Filesize

    4KB