Analysis

  • max time kernel
    152s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2023 16:37

General

  • Target

    03786199.msi

  • Size

    404KB

  • MD5

    e381e9903abc3b3c725c53838467a257

  • SHA1

    e14b0b365ba6cca98f6f7380617ed1362fee6b89

  • SHA256

    83648865d6015e61bf4c45a3aa17b8ce86951bcfc28a70fe36cfc2f597984c4a

  • SHA512

    d09765cd4e69471b3b7be51c2d0c6c2178c45101fd5bcffbd2cbbd10958596c1eb0653857bf75ae621e064109756b33df6384bd55179f844d760dcf0df41d3ca

  • SSDEEP

    6144:MNVPe+3R6gz8C1psDVw8EAYwzPJLNee9iZiYnCpqvY1dGujAyep5vDhPLu6RAeHE:xxCriEQzPJLNee9Lp1NjAyefvDI6RjE

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\03786199.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2020
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
      2⤵
        PID:1832
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1708
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1240
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003AC" "0000000000000484"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1584

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6cafe2.rbs

      Filesize

      8KB

      MD5

      9f2b3569999d9d57c67d2e76b7cca680

      SHA1

      ca219b1e36cc2f204f28fbda5c1c0571c341c952

      SHA256

      07401f3ca618ffd5adcf3c140c03da4f3227de8031b22f550ff052719a39d2f5

      SHA512

      3b4ca4aee774853f2a6be39b6e77027efd479f47f9c3af413033951f981d7158fb380682768940b6937649404fec29f088c88b0f1e959b9c1b10209f3915fea8

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      2185add4a967f3d974a73fc9b842633b

      SHA1

      ec64fe7e0409efbf0854c2158569f2f6d6c053a3

      SHA256

      8919918640ed4cf30c6a6a200a7ed768b38d11e247a17266816fa96411404e03

      SHA512

      e9a9b55ead2afbfb15183394ffb949ad253eabcd756f22561d4b1aa4838a64a057d50343c6518c2c940af22e77a0a0dcbe562a3e138d4766838d08fe11af7066

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

      Filesize

      132B

      MD5

      0d4c9f15ce74465c59ae36a27f98c817

      SHA1

      9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

      SHA256

      d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

      SHA512

      9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

    • C:\Windows\Installer\6cafe0.msi

      Filesize

      404KB

      MD5

      e381e9903abc3b3c725c53838467a257

      SHA1

      e14b0b365ba6cca98f6f7380617ed1362fee6b89

      SHA256

      83648865d6015e61bf4c45a3aa17b8ce86951bcfc28a70fe36cfc2f597984c4a

      SHA512

      d09765cd4e69471b3b7be51c2d0c6c2178c45101fd5bcffbd2cbbd10958596c1eb0653857bf75ae621e064109756b33df6384bd55179f844d760dcf0df41d3ca

    • \??\PIPE\wkssvc

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      2185add4a967f3d974a73fc9b842633b

      SHA1

      ec64fe7e0409efbf0854c2158569f2f6d6c053a3

      SHA256

      8919918640ed4cf30c6a6a200a7ed768b38d11e247a17266816fa96411404e03

      SHA512

      e9a9b55ead2afbfb15183394ffb949ad253eabcd756f22561d4b1aa4838a64a057d50343c6518c2c940af22e77a0a0dcbe562a3e138d4766838d08fe11af7066

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      2185add4a967f3d974a73fc9b842633b

      SHA1

      ec64fe7e0409efbf0854c2158569f2f6d6c053a3

      SHA256

      8919918640ed4cf30c6a6a200a7ed768b38d11e247a17266816fa96411404e03

      SHA512

      e9a9b55ead2afbfb15183394ffb949ad253eabcd756f22561d4b1aa4838a64a057d50343c6518c2c940af22e77a0a0dcbe562a3e138d4766838d08fe11af7066

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      2185add4a967f3d974a73fc9b842633b

      SHA1

      ec64fe7e0409efbf0854c2158569f2f6d6c053a3

      SHA256

      8919918640ed4cf30c6a6a200a7ed768b38d11e247a17266816fa96411404e03

      SHA512

      e9a9b55ead2afbfb15183394ffb949ad253eabcd756f22561d4b1aa4838a64a057d50343c6518c2c940af22e77a0a0dcbe562a3e138d4766838d08fe11af7066

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      2185add4a967f3d974a73fc9b842633b

      SHA1

      ec64fe7e0409efbf0854c2158569f2f6d6c053a3

      SHA256

      8919918640ed4cf30c6a6a200a7ed768b38d11e247a17266816fa96411404e03

      SHA512

      e9a9b55ead2afbfb15183394ffb949ad253eabcd756f22561d4b1aa4838a64a057d50343c6518c2c940af22e77a0a0dcbe562a3e138d4766838d08fe11af7066

    • memory/1708-91-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB

    • memory/1708-92-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1708-98-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1708-99-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1708-100-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1708-101-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1708-102-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1812-85-0x00000000006D0000-0x00000000006F4000-memory.dmp

      Filesize

      144KB

    • memory/1812-84-0x0000000000660000-0x0000000000663000-memory.dmp

      Filesize

      12KB