Resubmissions

16-05-2024 06:08

240516-gv9n7sff28 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-05-2024 06:08

General

  • Target

    a40000.dll

  • Size

    408KB

  • MD5

    45234504c9fc489cb71be23f1ffeed73

  • SHA1

    e51e28ac648917523c51d9b5a4a1641a3b1202c6

  • SHA256

    b991ef2d58b3246bf5f313e2be71ea961fae1376ec88435173f7fb15a48b6fe2

  • SHA512

    868458dee62fdb69bb5e396251a26091b71490ee7ca04b3d0342a18455f7a7e29d9981b024ce48fedbe85494374a40ed601e53bef9a615e4c8f3304c56655297

  • SSDEEP

    12288:SWutt3oBwRkzp8e2gTQTLZMJpkrLThkr6S:SjtfuzQkCThkr6

Malware Config

Extracted

Family

qakbot

Version

403.532

Botnet

tr

Campaign

1645451836

C2

190.206.211.182:443

31.35.28.29:443

105.186.167.230:995

72.252.201.34:990

40.134.247.125:995

186.64.87.194:443

2.50.41.69:61200

217.164.119.29:2222

161.142.53.137:443

74.15.2.252:2222

149.135.101.20:443

92.177.45.46:2078

190.73.3.148:2222

81.213.206.182:443

180.233.150.134:995

217.164.115.166:2222

144.202.2.175:443

105.184.116.32:995

47.180.172.159:50010

96.21.251.127:2222

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 23 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a40000.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a40000.dll
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn rfjjabylaq /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\a40000.dll\"" /SC ONCE /Z /ST 06:11 /ET 06:23
          4⤵
          • Creates scheduled task(s)
          PID:4288
  • C:\Windows\system32\control.exe
    "C:\Windows\system32\control.exe" SYSTEM
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3996
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
    1⤵
      PID:4536
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:3308
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:3324
      • C:\Windows\System32\oobe\UserOOBEBroker.exe
        C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        PID:712
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
        1⤵
          PID:484
        • C:\Windows\system32\regsvr32.exe
          regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\a40000.dll"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Windows\SysWOW64\regsvr32.exe
            -s "C:\Users\Admin\AppData\Local\Temp\a40000.dll"
            2⤵
            • Loads dropped DLL
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:604
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              3⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of WriteProcessMemory
              PID:3600
              • C:\Windows\system32\reg.exe
                C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Vujuzoecgo" /d "0"
                4⤵
                • Windows security bypass
                PID:4632
              • C:\Windows\system32\reg.exe
                C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ejyjl" /d "0"
                4⤵
                • Windows security bypass
                PID:2288
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /0
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3996

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\a40000.dll

          Filesize

          408KB

          MD5

          45234504c9fc489cb71be23f1ffeed73

          SHA1

          e51e28ac648917523c51d9b5a4a1641a3b1202c6

          SHA256

          b991ef2d58b3246bf5f313e2be71ea961fae1376ec88435173f7fb15a48b6fe2

          SHA512

          868458dee62fdb69bb5e396251a26091b71490ee7ca04b3d0342a18455f7a7e29d9981b024ce48fedbe85494374a40ed601e53bef9a615e4c8f3304c56655297

        • memory/2772-0-0x0000000000420000-0x000000000048C000-memory.dmp

          Filesize

          432KB

        • memory/2772-3-0x0000000000420000-0x000000000048C000-memory.dmp

          Filesize

          432KB

        • memory/2772-6-0x0000000000420000-0x000000000048C000-memory.dmp

          Filesize

          432KB

        • memory/2772-5-0x0000000000420000-0x000000000048C000-memory.dmp

          Filesize

          432KB

        • memory/2772-4-0x0000000000420000-0x000000000048C000-memory.dmp

          Filesize

          432KB

        • memory/2772-8-0x0000000000420000-0x000000000048C000-memory.dmp

          Filesize

          432KB

        • memory/3600-19-0x0000000000610000-0x000000000067C000-memory.dmp

          Filesize

          432KB

        • memory/3600-18-0x0000000000610000-0x000000000067C000-memory.dmp

          Filesize

          432KB

        • memory/3600-17-0x0000000000610000-0x000000000067C000-memory.dmp

          Filesize

          432KB

        • memory/3600-21-0x0000000000610000-0x000000000067C000-memory.dmp

          Filesize

          432KB

        • memory/3600-20-0x0000000000610000-0x000000000067C000-memory.dmp

          Filesize

          432KB

        • memory/3996-23-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-24-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-22-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-34-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-33-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-32-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-31-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-30-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-29-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB

        • memory/3996-28-0x00000180A41A0000-0x00000180A41A1000-memory.dmp

          Filesize

          4KB