Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    13-07-2022 22:46

General

  • Target

    362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5.msi

  • Size

    676KB

  • MD5

    a0d132cdc67c29abf79ecf455c4a4e25

  • SHA1

    2b278de35e52d695b27e1c880d35db04daa982bf

  • SHA256

    362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5

  • SHA512

    645d2e3a168667de44d04756f48fe1d7d6581efc0755dccd72f6e09e603300783777b3b3376bb0d2bfab4c1ad3d239845eb606acffc3ea4ea4261d451c427ddf

Malware Config

Extracted

Family

qakbot

Version

403.780

Botnet

vip01

Campaign

1657721813

C2

67.209.195.198:443

63.143.92.99:995

148.64.96.100:443

72.252.157.93:990

72.252.157.93:995

89.101.97.139:443

76.25.142.196:443

47.180.172.159:443

67.165.206.193:993

32.221.224.140:995

70.46.220.114:443

176.45.218.138:995

174.69.215.101:443

24.54.48.11:443

86.97.10.37:443

81.158.239.251:2078

37.34.253.233:443

120.150.218.241:995

186.90.153.162:2222

38.70.253.226:2222

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3884
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3568
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
        2⤵
          PID:436
        • C:\Windows\system32\regsvr32.exe
          regsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2396
          • C:\Windows\SysWOW64\regsvr32.exe
            -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2180
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:64
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 00:49 /tn nicrwypqez /ET 01:00 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA" /SC ONCE
                5⤵
                • Creates scheduled task(s)
                PID:2576
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4048
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
        1⤵
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2620
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA
        1⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:3656
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              4⤵
              • Modifies data under HKEY_USERS
              PID:2868

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_32ADABCB823BA1231EA36C215C0D3FFB

        Filesize

        727B

        MD5

        8a242b0a127a02e6fc3f64b614243b36

        SHA1

        c2d138d37c8f8ba7a32c2899de0a95aeb53819eb

        SHA256

        ea3a5f0a6c6234215dd939266556f704718c66dd5539cef858f63e465df2df47

        SHA512

        2c2a6ab2c0665fa75f7d880c9329b7373284a3b67152ed2718175fdd46a53c73a1007c029b464014d74ab747368c622b59ce1bc065b37d0cf2851ae8d41f779b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

        Filesize

        727B

        MD5

        f03c38eaf2e70f775a5e3f79b32f9763

        SHA1

        30f5e388bca5b15c6ef3631c0b1541a5eba22de8

        SHA256

        5080434e11aca036882d802de0651de62b0055160338056354cc04ca29318e9d

        SHA512

        5be3ae475fcdb1096eb287f155875209cf95419d7ad0db6cf31f9b73ea4a2ef9153a2769edc7ef870199b536b710b22b9a9b451accf5c09dec1874389909c7b8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_32ADABCB823BA1231EA36C215C0D3FFB

        Filesize

        438B

        MD5

        1729cbd31b85ca6a2405d3d9f4564a75

        SHA1

        892d283d048c3f825bb04b99630c3922e1932750

        SHA256

        d80872bd3c6c49354aec19257e3c69a422f7f01bb467b7e141a6214e9bedc3a6

        SHA512

        620cec48ab788dd8b8eeaf7f15298c0b1e2a04e616c9681c72f6feba160f9bdac8eb9dd093ff7b8b894797ae610fd16f59d6f59a42b1ae94f3f6a66f72cac7a9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

        Filesize

        412B

        MD5

        040a464fbc70f45c59fc6b7e0b886fc7

        SHA1

        506ca1df406071bc40c6c113dc79549bdbf3ef8c

        SHA256

        a0d938003c57355fa41ac41ba1557fcce7bdadc0e16d93f7827bc5918aea8935

        SHA512

        7e4f7b22aed2108b2af475d7210ac7cac81be178b7d9b5f173870aa6cebb40a6049be869fd8c48ad0503e9e2a823b62a73ad18f6a76b1e02a91b594ab6a13276

      • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll

        Filesize

        1.3MB

        MD5

        2fce945f0621e3812618f55c4a3926e9

        SHA1

        65aa7e9e33d25ee812e9ac86f45488c6c531d9ad

        SHA256

        c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a

        SHA512

        95a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614

      • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll

        Filesize

        1.3MB

        MD5

        2fce945f0621e3812618f55c4a3926e9

        SHA1

        65aa7e9e33d25ee812e9ac86f45488c6c531d9ad

        SHA256

        c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a

        SHA512

        95a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614

      • C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs

        Filesize

        68B

        MD5

        0308aa2c8dab8a69de41f5d16679bb9b

        SHA1

        c6827bf44a433ff086e787653361859d6f6e2fb3

        SHA256

        0a7e8fd68575db5f84c18b9a26e4058323d1357e2a29a5b12278e4bfa6939489

        SHA512

        1a1ca92e3c8d52c8b5adbb3117a88d8a2a8c33eaf2f7b0d620fe006653f57f4ba0b803884616594ca31e13a1b0b59ddae52cecf044621ec44371084dac6beb72

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        25.0MB

        MD5

        03f73130d2d64e02fc77159769b5de7d

        SHA1

        afd24527d397046c65f49e94e1d9b1416a4d0bfe

        SHA256

        3e85918aab88e7ac456798c783e1a0fbc8e001420f90a0ed62afac2554f3171f

        SHA512

        aa91d41785cc221293377a9e1f0e23c82f07548c669657c9d12567b0610652527c56137d7706fa1616bdf430ce617f9e6e3752ec6638481e00dc54364946e5ba

      • \??\Volume{a312788f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{8347d591-98bd-409e-bc32-fcad9d059afd}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        2a4bd08cbb3459301d037e8dfccc8553

        SHA1

        a0188e41a1856d1ce3b6c8234ab0c17a352683b6

        SHA256

        01defc814338269cb3377c0b57bf9740b544b1ddec255d6eb4dfb7e96cb34267

        SHA512

        14f2803c187a5b65bb6413843d2f6033f048a46f3f92c12769f23ccec6660f786f3ca993e240133c456a03aa32b8e9926358c4f223716ebca4d20e4179e7615d

      • \Users\Admin\AppData\Local\AdobeFontPack\main.dll

        Filesize

        1.3MB

        MD5

        2fce945f0621e3812618f55c4a3926e9

        SHA1

        65aa7e9e33d25ee812e9ac86f45488c6c531d9ad

        SHA256

        c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a

        SHA512

        95a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614

      • \Users\Admin\AppData\Local\AdobeFontPack\main.dll

        Filesize

        1.3MB

        MD5

        2fce945f0621e3812618f55c4a3926e9

        SHA1

        65aa7e9e33d25ee812e9ac86f45488c6c531d9ad

        SHA256

        c7dfc591c7dc5371c60bd0fb1cc7ca2c14dd630a0e7272b4fac98e8d2ee5567a

        SHA512

        95a6c8761952b43c238094fba672c0c15d011ff0af69b5100b37a52ab9b00f355337a15787fea95bd31038a4dff5a1cdfeffa70b006849f66027dcd72f2b1614

      • memory/64-278-0x0000000002BB0000-0x0000000002BD2000-memory.dmp

        Filesize

        136KB

      • memory/64-197-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-189-0x0000000000000000-mapping.dmp

      • memory/64-191-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-192-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-199-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-195-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-279-0x0000000002BB0000-0x0000000002BD2000-memory.dmp

        Filesize

        136KB

      • memory/64-198-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-196-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-194-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-193-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/64-190-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/436-125-0x0000000000000000-mapping.dmp

      • memory/1756-290-0x0000000000000000-mapping.dmp

      • memory/2180-143-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-181-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-147-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-150-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-149-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-151-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-152-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-153-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-154-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-155-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-157-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-158-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-156-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-160-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-159-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-161-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-162-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-163-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-164-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-165-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-167-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-166-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-168-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-169-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-173-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-172-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-171-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-146-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-174-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-175-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-145-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-144-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-178-0x00000000050B0000-0x00000000050D2000-memory.dmp

        Filesize

        136KB

      • memory/2180-179-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-180-0x0000000005080000-0x00000000050A2000-memory.dmp

        Filesize

        136KB

      • memory/2180-148-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-182-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-183-0x00000000050B0000-0x00000000050D2000-memory.dmp

        Filesize

        136KB

      • memory/2180-184-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-186-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-185-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-187-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-188-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-128-0x0000000000000000-mapping.dmp

      • memory/2180-142-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-140-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-141-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-139-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-138-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-137-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-136-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-135-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-134-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-133-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-248-0x00000000050B0000-0x00000000050D2000-memory.dmp

        Filesize

        136KB

      • memory/2180-130-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-131-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2180-132-0x00000000776A0000-0x000000007782E000-memory.dmp

        Filesize

        1.6MB

      • memory/2396-126-0x0000000000000000-mapping.dmp

      • memory/2576-251-0x0000000000000000-mapping.dmp

      • memory/2712-293-0x0000000000000000-mapping.dmp

      • memory/2712-346-0x0000000002E70000-0x0000000002E92000-memory.dmp

        Filesize

        136KB

      • memory/2712-347-0x0000000002EA0000-0x0000000002EC2000-memory.dmp

        Filesize

        136KB

      • memory/2712-406-0x0000000002EA0000-0x0000000002EC2000-memory.dmp

        Filesize

        136KB

      • memory/2868-348-0x0000000000000000-mapping.dmp

      • memory/2868-416-0x0000000002CC0000-0x0000000002CE2000-memory.dmp

        Filesize

        136KB

      • memory/3568-120-0x0000000000000000-mapping.dmp

      • memory/3656-284-0x00000258C1A40000-0x00000258C1A62000-memory.dmp

        Filesize

        136KB

      • memory/3656-287-0x00000258C1D00000-0x00000258C1D76000-memory.dmp

        Filesize

        472KB