Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 06:28

General

  • Target

    2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe

  • Size

    5.7MB

  • MD5

    6430e9ec7e8c1fb1e7a78b73932419bc

  • SHA1

    b5d1b1cc515bd623f9866e1de040a2a73c753420

  • SHA256

    773857db776e83d1d4cc43ebb1d9ab67b6de3e14ddb8a413c757557b4ad3dd23

  • SHA512

    4243aa6ec4281ea2808bcf070fa50eb510b82fc3cc2455699a15da1b0464600acece38a67f8797aa5c8d4831ff138e05ebde0f520f687f8e48680709875b82eb

  • SSDEEP

    98304:HskDP1dOcdwJeV/ztZBe91oiImuUiK9N9EGQKF9BSHLr7a3:LOtS/hwkmg4EdLrO3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe
      C:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Modifies system certificate store
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe

    Filesize

    4.2MB

    MD5

    d2281df0fbdea076f9d1b9aa9d0770db

    SHA1

    9ee08be6e3018169c78833bd1420f5e1cd15272f

    SHA256

    1136537945345b9516ccf3cb0a7348839445d280188ef52f25b6ecdacd8a8628

    SHA512

    0f031aae359f3b4e4aea7a44db49a07415758ad9cceeddfbd533612e267ae293ed7a8cce28d5a47f27edac79bb0b05c6cbb48d25a0e36dea82b74804172e4cb6

  • memory/2036-0-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB