Resubmissions

15-07-2022 15:30

220715-sxxcfacgcj 10

12-07-2022 18:09

220712-wrfdhsbgen 10

Analysis

  • max time kernel
    300s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • resource tags

    arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2022 15:30

General

  • Target

    PDF_3028225.msi

  • Size

    484KB

  • MD5

    47847ac5f01e037c1a18becc0dfd4611

  • SHA1

    d6f37b18252787c2c2c31358e741d9b834440331

  • SHA256

    7d1c0c7e4cbfe49926451ab6365455e5f3889fb17e2508afa9f6e2ebeedaa2c1

  • SHA512

    7630b223cddfc31ef7afee9972ab4a5100b048d35f526211e331f4717260e2c29b0962ad35271701b00c5c379f7798004f5140abe8dbc88ddf083d8b2ee78004

Malware Config

Extracted

Family

qakbot

Version

403.780

Botnet

vip01

Campaign

1657631718

C2

47.23.89.60:993

37.34.253.233:443

196.203.37.215:80

89.211.209.234:2222

81.158.239.251:2078

179.111.8.52:32101

208.107.221.224:443

24.158.23.166:995

66.230.104.103:443

92.132.132.81:2222

24.139.72.117:443

174.80.15.101:2083

24.178.196.158:2222

100.38.242.113:995

37.186.58.99:995

24.55.67.176:443

74.14.5.179:2222

172.114.160.81:443

40.134.246.185:995

63.143.92.99:995

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PDF_3028225.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1356
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\regsvr32.exe
        -n -i:"Install" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:972
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1528
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:34 /tn lmzhabdc /ET 17:45 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA" /SC ONCE
            5⤵
            • Creates scheduled task(s)
            PID:1460
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
      2⤵
        PID:1016
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2028
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000494" "0000000000000060"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:768
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {5B6F1B80-EFB4-43C2-BE72-0C3CA7CC32B6} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABBAGQAbwBiAGUARgBvAG4AdABQAGEAYwBrAFwAbQBhAGkAbgAuAGQAbABsACIA
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1292
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1672
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
      1⤵
      • Loads dropped DLL
      PID:1320
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:752

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      60KB

      MD5

      589c442fc7a0c70dca927115a700d41e

      SHA1

      66a07dace3afbfd1aa07a47e6875beab62c4bb31

      SHA256

      2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

      SHA512

      1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      81180e6505eafdf7950673b3e510e370

      SHA1

      b9adb7725c8910f87728ec4f4a68ccb7c7bf470c

      SHA256

      c8acca13997e628aed88c556833c0b9622a948efa4584262cd974f812b9a5504

      SHA512

      a23844fb64c2ebfb6d3d771c341a08007c60b409037b6eedcee335c1e9c6bb76005abb3e5ceeb71d1d32d0a0129f4fa7dd892e79943bdb60b4649c390e1e7e7f

    • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
      Filesize

      777KB

      MD5

      926382093a313282f4a1639944f3fb0c

      SHA1

      851380d94deeb031aad806795d760f3982399850

      SHA256

      1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

      SHA512

      f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

    • C:\Users\Admin\AppData\Local\AdobeFontPack\main.dll
      Filesize

      777KB

      MD5

      926382093a313282f4a1639944f3fb0c

      SHA1

      851380d94deeb031aad806795d760f3982399850

      SHA256

      1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

      SHA512

      f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

    • C:\Users\Admin\AppData\Local\AdobeFontPack\notify.vbs
      Filesize

      68B

      MD5

      0308aa2c8dab8a69de41f5d16679bb9b

      SHA1

      c6827bf44a433ff086e787653361859d6f6e2fb3

      SHA256

      0a7e8fd68575db5f84c18b9a26e4058323d1357e2a29a5b12278e4bfa6939489

      SHA512

      1a1ca92e3c8d52c8b5adbb3117a88d8a2a8c33eaf2f7b0d620fe006653f57f4ba0b803884616594ca31e13a1b0b59ddae52cecf044621ec44371084dac6beb72

    • \??\PIPE\wkssvc
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Local\AdobeFontPack\main.dll
      Filesize

      777KB

      MD5

      926382093a313282f4a1639944f3fb0c

      SHA1

      851380d94deeb031aad806795d760f3982399850

      SHA256

      1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

      SHA512

      f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

    • \Users\Admin\AppData\Local\AdobeFontPack\main.dll
      Filesize

      777KB

      MD5

      926382093a313282f4a1639944f3fb0c

      SHA1

      851380d94deeb031aad806795d760f3982399850

      SHA256

      1ce7c87d8dc79ace14eb2a1be829f2d3b321b70717f723a61998ab3b9112eec8

      SHA512

      f315d01e8475c4bc73a9c2e18c17c462b826dec66d9900534f0ccddd08f782642828fe1c2b3a04049f82c38f24cd48f419c7d1c91200ca1de32f27642ac145d3

    • memory/972-68-0x0000000000610000-0x0000000000632000-memory.dmp
      Filesize

      136KB

    • memory/972-64-0x0000000075541000-0x0000000075543000-memory.dmp
      Filesize

      8KB

    • memory/972-66-0x0000000000311000-0x000000000039A000-memory.dmp
      Filesize

      548KB

    • memory/972-67-0x0000000000610000-0x0000000000632000-memory.dmp
      Filesize

      136KB

    • memory/972-76-0x0000000000610000-0x0000000000632000-memory.dmp
      Filesize

      136KB

    • memory/972-69-0x0000000000610000-0x0000000000632000-memory.dmp
      Filesize

      136KB

    • memory/972-70-0x00000000005E0000-0x0000000000602000-memory.dmp
      Filesize

      136KB

    • memory/972-71-0x0000000000610000-0x0000000000632000-memory.dmp
      Filesize

      136KB

    • memory/972-62-0x0000000000000000-mapping.dmp
    • memory/1016-60-0x0000000000000000-mapping.dmp
    • memory/1052-58-0x0000000000000000-mapping.dmp
    • memory/1292-82-0x000007FEF2920000-0x000007FEF3343000-memory.dmp
      Filesize

      10.1MB

    • memory/1292-84-0x0000000001254000-0x0000000001257000-memory.dmp
      Filesize

      12KB

    • memory/1292-87-0x000000000125B000-0x000000000127A000-memory.dmp
      Filesize

      124KB

    • memory/1292-85-0x000000000125B000-0x000000000127A000-memory.dmp
      Filesize

      124KB

    • memory/1292-80-0x0000000000000000-mapping.dmp
    • memory/1292-83-0x000007FEF1DC0000-0x000007FEF291D000-memory.dmp
      Filesize

      11.4MB

    • memory/1320-90-0x0000000000000000-mapping.dmp
    • memory/1356-54-0x000007FEFB751000-0x000007FEFB753000-memory.dmp
      Filesize

      8KB

    • memory/1460-78-0x0000000000000000-mapping.dmp
    • memory/1528-77-0x0000000000080000-0x00000000000A2000-memory.dmp
      Filesize

      136KB

    • memory/1528-79-0x0000000000080000-0x00000000000A2000-memory.dmp
      Filesize

      136KB

    • memory/1528-74-0x00000000740F1000-0x00000000740F3000-memory.dmp
      Filesize

      8KB

    • memory/1528-72-0x0000000000000000-mapping.dmp
    • memory/1672-86-0x0000000000000000-mapping.dmp