Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2023, 15:42

General

  • Target

    ProjectFunding_450726_Jun01.js

  • Size

    1KB

  • MD5

    a657553449746c482dacfe3b19119b7a

  • SHA1

    630b815d443f8f7ef7e4c4c7c100de1cd8a7ed53

  • SHA256

    44e029dd6210c4906a82e1f16dd5ebed434efd225dafb92fc560e6ff6d1ee948

  • SHA512

    dea33536a5c5fe279ca1a8a3d4639be0f49d5ca3c21f4cbbda10c5d059837c2bc4c3917cdbddd0fc9f4a0773f325369b200f0df8e0035da6afab26f09502c321

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ProjectFunding_450726_Jun01.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2036
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1236
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4692
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4928
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:3576
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:2104

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57dfe1.rbs

        Filesize

        9KB

        MD5

        6f8cfe52124f47714b043d07e18e972c

        SHA1

        4ac0a41ae8c02759662821c73505095ae2b44475

        SHA256

        4c3b9641b154c519922dbc9a4020aae89b8c8581d5185171f27cb1ccf2dce498

        SHA512

        a60aeb6b3a69638f4fb5571167f5355680cfbc3f78b892c4089612c5887404c7cc8262ef4b30d8ad5fc763aceb13806247dc713b7ff521cefff3d50e6fe20dd2

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        12b90779ae5dd6239f0cf41c1bc2a2d4

        SHA1

        f3e00ea8a86ccdcd0a3d252e98f9e8e194052286

        SHA256

        bf8b2a3b17dd1379f749d0b9b709bfce9774ccf889d490a46a97b76632ad8a2f

        SHA512

        9bee8bea7f8941f40fa0ef8605fe942d91ae789059023b1fb5878457a7b317b916629a1c194a25f177530cbb677cf91fd946e94b067e245b847189984b4bc4bd

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        12b90779ae5dd6239f0cf41c1bc2a2d4

        SHA1

        f3e00ea8a86ccdcd0a3d252e98f9e8e194052286

        SHA256

        bf8b2a3b17dd1379f749d0b9b709bfce9774ccf889d490a46a97b76632ad8a2f

        SHA512

        9bee8bea7f8941f40fa0ef8605fe942d91ae789059023b1fb5878457a7b317b916629a1c194a25f177530cbb677cf91fd946e94b067e245b847189984b4bc4bd

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\MSIFCB4.tmp

        Filesize

        404KB

        MD5

        9b06cae676c6086192a8ddd303332849

        SHA1

        e50c2ee48427547edf22f247b0f16def69eb17d5

        SHA256

        d0e8241fa1ea48137aa8683131042f92e4faf8621e02838a83d9fd8d07971d2d

        SHA512

        40f486154f3b019450a95c41bd240b2fd34e7e3ce12e9dcb51695a8e69d2226c0ccae5d3cd1283ebb1e146fd374902867284def5b44e0f6d2e58b6d63f1406ca

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        131bb42b21e1b4a2aa4223c4d624a446

        SHA1

        2617269ddcee28a3ac7cae97389b9b9357d4d59d

        SHA256

        38b78600cca710f164c9dc6828c8d8d4ed87cedac553e2d92da227920894ba49

        SHA512

        f56e26f24362bf1900dad0280a791938c80094723357b717ddc29311038fed7c4485cdb9aedf1cb268e9f4cc1940c4df8acf57d232bd822620322d349baf6906

      • \??\Volume{07416f20-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{af993a4c-2f1f-4a5f-9aac-c1f32022f0de}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        e7c286efa738a86ee4375c0da9b35f0a

        SHA1

        c9a129218a2b71b78e5e6385ec0564b69bef3493

        SHA256

        823bc43f8be14c7b046d51de2529c8d6741ec26e1a398195035f101fdf8d56b5

        SHA512

        9787178ab9b0a715c4e888b0f6d965090d0db2be9c2ff0f1e31414af3c1f51c20e54f9bcc7c9e7423ea2ffb528b9f987b21f535c06a6420c02a1afd9b41ba806

      • memory/4692-171-0x00000000013D0000-0x00000000013F4000-memory.dmp

        Filesize

        144KB

      • memory/4692-169-0x00000000013C0000-0x00000000013C3000-memory.dmp

        Filesize

        12KB

      • memory/4928-177-0x0000000000450000-0x0000000000452000-memory.dmp

        Filesize

        8KB

      • memory/4928-178-0x0000000000420000-0x0000000000444000-memory.dmp

        Filesize

        144KB

      • memory/4928-184-0x0000000000420000-0x0000000000444000-memory.dmp

        Filesize

        144KB

      • memory/4928-185-0x0000000000420000-0x0000000000444000-memory.dmp

        Filesize

        144KB

      • memory/4928-186-0x0000000000420000-0x0000000000444000-memory.dmp

        Filesize

        144KB

      • memory/4928-187-0x0000000000420000-0x0000000000444000-memory.dmp

        Filesize

        144KB

      • memory/4928-188-0x0000000000420000-0x0000000000444000-memory.dmp

        Filesize

        144KB