Analysis

  • max time kernel
    300s
  • max time network
    301s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2022 14:42

General

  • Target

    Calculation8808_Oct18.html

  • Size

    941KB

  • MD5

    afcaeea9c56bdec58a207c8ac6890ad3

  • SHA1

    03a7ed0478539b55f7bb1cc8c073b2d282f8c5d3

  • SHA256

    f80312acccc149b481bcd2efd336c083815379dc51e6d8207711825efc0b2d89

  • SHA512

    943811ef44e3aa4152a9c59b203763f6ec7b288cad9b9475416c7dfd326bb2c29d66c9b01a621d7348ffe47e626ba28d46bc437310a9db10148e1f8be01ab5ec

  • SSDEEP

    24576:EIVZSR+10T9+2x5F/y57dZyPXhl0LJkqj:3y1BD7F6b

Malware Config

Extracted

Family

qakbot

Version

403.973

Botnet

obama214

Campaign

1666019778

C2

105.96.221.136:443

37.37.80.2:3389

105.154.56.232:995

41.107.116.19:443

105.103.52.189:443

159.192.204.135:443

41.107.58.251:443

177.152.65.142:443

102.47.218.41:443

176.45.35.243:443

70.173.248.13:443

102.159.77.134:995

220.123.29.76:443

82.12.196.197:443

103.156.237.71:443

149.126.159.254:443

176.44.119.153:443

181.56.171.3:995

190.205.229.67:2222

151.251.50.117:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" C:\Users\Admin\AppData\Local\Temp\Calculation8808_Oct18.html
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" C:\Users\Admin\AppData\Local\Temp\Calculation8808_Oct18.html
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2560.0.515639250\1724775556" -parentBuildID 20200403170909 -prefsHandle 1712 -prefMapHandle 1704 -prefsLen 1 -prefMapSize 219989 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2560 "\\.\pipe\gecko-crash-server-pipe.2560" 1804 gpu
        3⤵
          PID:2904
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2560.3.2064456308\351596371" -childID 1 -isForBrowser -prefsHandle 2460 -prefMapHandle 2444 -prefsLen 112 -prefMapSize 219989 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2560 "\\.\pipe\gecko-crash-server-pipe.2560" 2436 tab
          3⤵
            PID:956
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2560.13.58264662\1803564895" -childID 2 -isForBrowser -prefsHandle 3780 -prefMapHandle 3776 -prefsLen 6894 -prefMapSize 219989 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2560 "\\.\pipe\gecko-crash-server-pipe.2560" 3768 tab
            3⤵
              PID:2172
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2560.20.238834925\270535239" -childID 3 -isForBrowser -prefsHandle 4596 -prefMapHandle 4612 -prefsLen 7599 -prefMapSize 219989 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2560 "\\.\pipe\gecko-crash-server-pipe.2560" 3096 tab
              3⤵
                PID:2792
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:2784
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c vertices\knockers.cmd regsvr
              1⤵
              • Enumerates connected drives
              PID:3080
              • C:\Users\Admin\AppData\Local\Temp\mb.exe
                C:\Users\Admin\AppData\Local\Temp\mb.exe vertices\unenviably.asc
                2⤵
                • Executes dropped EXE
                PID:1648
                • C:\Windows\SysWOW64\regsvr32.exe
                  vertices\unenviably.asc
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:376
                  • C:\Windows\SysWOW64\wermgr.exe
                    C:\Windows\SysWOW64\wermgr.exe
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2768
              • C:\Windows\system32\PING.EXE
                ping 127.0.0.1
                2⤵
                • Runs ping.exe
                PID:2076

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\mb.exe

              Filesize

              24KB

              MD5

              b0c2fa35d14a9fad919e99d9d75e1b9e

              SHA1

              8d7c2fd354363daee63e8f591ec52fa5d0e23f6f

              SHA256

              022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7

              SHA512

              a6155e42b605425914d1bf745d9b2b5ed57976e161384731c6821a1f8fa2bc3207a863ae45d6ad371ac82733b72bb024204498baa4fb38ad46c6d7bc52e5a022

            • memory/376-134-0x0000000000000000-mapping.dmp

            • memory/376-135-0x00000000012C0000-0x00000000012EC000-memory.dmp

              Filesize

              176KB

            • memory/376-136-0x00000000012F0000-0x0000000001319000-memory.dmp

              Filesize

              164KB

            • memory/376-138-0x00000000012F0000-0x0000000001319000-memory.dmp

              Filesize

              164KB

            • memory/1648-132-0x0000000000000000-mapping.dmp

            • memory/2076-139-0x0000000000000000-mapping.dmp

            • memory/2768-137-0x0000000000000000-mapping.dmp

            • memory/2768-140-0x0000000000190000-0x00000000001B9000-memory.dmp

              Filesize

              164KB

            • memory/2768-141-0x0000000000190000-0x00000000001B9000-memory.dmp

              Filesize

              164KB