Analysis

  • max time kernel
    139s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2024, 14:09 UTC

General

  • Target

    0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b.dll

  • Size

    689KB

  • MD5

    fce20c78174b38ef7491e97461efce9e

  • SHA1

    594a74c8197228ac25eafd058ade9ec40533aad7

  • SHA256

    0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b

  • SHA512

    84a1bcfad2fbac58d733cb43945309921e89272ea47030d9e9cc9b17813279e26e0410e65296065e3f825de3a47b7486cf65e07e62dfd1ccd63cede744b83833

  • SSDEEP

    12288:BrI0bPKn8p/S0jXgfFWVkMXl2xAgwFX2ddG83tNzZ0XssC82H6/vLyWMAy:pI0bP1XWMXsAZX6JcTLdMN

Malware Config

Extracted

Family

qakbot

Version

402.363

Botnet

obama117

Campaign

1634545803

C2

176.45.53.222:443

220.255.25.28:2222

91.178.126.51:995

2.222.167.138:443

65.100.174.110:995

105.198.236.99:995

115.96.64.9:995

196.207.140.40:995

24.231.209.2:2222

146.66.238.74:443

103.82.211.39:995

65.100.174.110:443

103.142.10.177:443

140.82.49.12:443

78.105.213.151:995

41.86.42.158:995

89.101.97.139:443

120.150.218.241:995

24.119.214.7:443

103.143.8.71:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs 4 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn gjdjvswtv /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b.dll\"" /SC ONCE /Z /ST 14:11 /ET 14:23
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2976
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {42541169-1E51-4193-BE63-3E21DED17309} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\Users\Admin\AppData\Local\Temp\0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Iotryushig" /d "0"
            5⤵
            • Windows security bypass
            PID:1948
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Rdbuqoizpbbn" /d "0"
            5⤵
            • Windows security bypass
            PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b.dll

    Filesize

    689KB

    MD5

    fce20c78174b38ef7491e97461efce9e

    SHA1

    594a74c8197228ac25eafd058ade9ec40533aad7

    SHA256

    0def0284732d41ec83ce66364d566b6aa3d914d5e0d7c4dff68eae15df5d557b

    SHA512

    84a1bcfad2fbac58d733cb43945309921e89272ea47030d9e9cc9b17813279e26e0410e65296065e3f825de3a47b7486cf65e07e62dfd1ccd63cede744b83833

  • memory/1172-4-0x0000000074530000-0x00000000745ED000-memory.dmp

    Filesize

    756KB

  • memory/1172-3-0x00000000745DC000-0x00000000745E2000-memory.dmp

    Filesize

    24KB

  • memory/1172-0-0x0000000074530000-0x00000000745ED000-memory.dmp

    Filesize

    756KB

  • memory/1172-1-0x0000000074530000-0x00000000745ED000-memory.dmp

    Filesize

    756KB

  • memory/1172-8-0x0000000074530000-0x00000000745ED000-memory.dmp

    Filesize

    756KB

  • memory/2132-25-0x0000000073B30000-0x0000000073BED000-memory.dmp

    Filesize

    756KB

  • memory/2132-20-0x0000000073B30000-0x0000000073BED000-memory.dmp

    Filesize

    756KB

  • memory/2132-21-0x0000000073B30000-0x0000000073BED000-memory.dmp

    Filesize

    756KB

  • memory/2332-5-0x0000000000380000-0x0000000000382000-memory.dmp

    Filesize

    8KB

  • memory/2332-15-0x0000000000350000-0x0000000000371000-memory.dmp

    Filesize

    132KB

  • memory/2332-12-0x0000000000350000-0x0000000000371000-memory.dmp

    Filesize

    132KB

  • memory/2332-13-0x0000000000350000-0x0000000000371000-memory.dmp

    Filesize

    132KB

  • memory/2332-11-0x0000000000350000-0x0000000000371000-memory.dmp

    Filesize

    132KB

  • memory/2332-7-0x0000000000350000-0x0000000000371000-memory.dmp

    Filesize

    132KB

  • memory/2916-27-0x0000000000320000-0x0000000000341000-memory.dmp

    Filesize

    132KB

  • memory/2916-29-0x0000000000320000-0x0000000000341000-memory.dmp

    Filesize

    132KB

  • memory/2916-28-0x0000000000320000-0x0000000000341000-memory.dmp

    Filesize

    132KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.