Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2023 16:38

General

  • Target

    ProjectFunding_477443_Jun01.js

  • Size

    1KB

  • MD5

    6eec3609ad79c0b5efd01946dbf1f90d

  • SHA1

    f59d16c3aaf41e61fc39fad32d315eaf438df6d3

  • SHA256

    d2e421d6f0d2b40181cd19075284df13bbdbab7db7c79cbec45cd5ae3304bb4f

  • SHA512

    7b8f9861ba7baa173fbacd222b95938490cefd19aee7553629133483adcb12764e0a8c233e06e9bf55c754bc12b017ed5f904ccbf6d0bf290e68dc00b46fb0d5

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Modifies data under HKEY_USERS 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ProjectFunding_477443_Jun01.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1996
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:300
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
      2⤵
        PID:1552
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1508
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:956
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:548
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000590" "0000000000000060"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1516

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6ca49c.rbs

      Filesize

      8KB

      MD5

      efa318c654dcbf296a89f8081b66670f

      SHA1

      49981bbb9f6fc158f2b6574ed0765e18229d7771

      SHA256

      e12d19afd6f314b64d411e0c48a37f8b19e6a3fe28d8427d3d5fe4b6f6bfc010

      SHA512

      62040adab6a2de0ba07f373c7efed30f657bf6a457da8c23f02e70d3007e75d6062017ab52c36fd5ac19856278018e1533f54857b5cb7b9fff43bdf6da591ef6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      892fbb4f14347597aa165c6c6f8d8c4a

      SHA1

      f7acec318fcd4c1bb7886cba02fad6167c089d65

      SHA256

      442f4a8e2e1b48bc84f7d2cf9ceb8fa0fa9c690f5ffea9113c8ff3190c2104a8

      SHA512

      9ae1e6d9f343305b0fc33f1fbbdda9f9da516a26ee42f1d203786aa69ff37b5c1eefd46516274e7ac35d70336ce91b0c014a00c29c1fecad5715055448cf568f

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      081fa50c7fa24753b5e41a2de913d29d

      SHA1

      5fcb4a04aa2e2d3ee6f55f73f45615d71bd4e703

      SHA256

      3f9f71d00342e4cb96b2f182a69d7432d9c111263d8ebdb677c4240cd9dc7a55

      SHA512

      24c8916053ecac16f1c1da0df4c2c3bba80b5956345cf6f035252b728356a630cd54f0576d25164179e528b98e15cc11da3e13ba0350f3160ef9f4e0d34c4cf7

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

      Filesize

      132B

      MD5

      0d4c9f15ce74465c59ae36a27f98c817

      SHA1

      9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

      SHA256

      d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

      SHA512

      9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

    • C:\Users\Admin\AppData\Local\Temp\Cab2658.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar2788.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Windows\Installer\MSI2913.tmp

      Filesize

      404KB

      MD5

      ac71c051ce23ce9c8c73ce91a61e664c

      SHA1

      d69b19bab67a2cb6839cdbe184a48e55f579840a

      SHA256

      94877939361c7d2f0bcc3e1db5e1c7a3bd7cc06c6ff38b9e7ce6b4a386c3fb04

      SHA512

      426c0debf5f20b6ac6a212428d712d8c615822294ee62785e6f59af95199e0538db0b17757f7dc7efd44b06346cba5889bda63bd9f1bb8a858d8fcd6381f08d0

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      081fa50c7fa24753b5e41a2de913d29d

      SHA1

      5fcb4a04aa2e2d3ee6f55f73f45615d71bd4e703

      SHA256

      3f9f71d00342e4cb96b2f182a69d7432d9c111263d8ebdb677c4240cd9dc7a55

      SHA512

      24c8916053ecac16f1c1da0df4c2c3bba80b5956345cf6f035252b728356a630cd54f0576d25164179e528b98e15cc11da3e13ba0350f3160ef9f4e0d34c4cf7

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      081fa50c7fa24753b5e41a2de913d29d

      SHA1

      5fcb4a04aa2e2d3ee6f55f73f45615d71bd4e703

      SHA256

      3f9f71d00342e4cb96b2f182a69d7432d9c111263d8ebdb677c4240cd9dc7a55

      SHA512

      24c8916053ecac16f1c1da0df4c2c3bba80b5956345cf6f035252b728356a630cd54f0576d25164179e528b98e15cc11da3e13ba0350f3160ef9f4e0d34c4cf7

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      081fa50c7fa24753b5e41a2de913d29d

      SHA1

      5fcb4a04aa2e2d3ee6f55f73f45615d71bd4e703

      SHA256

      3f9f71d00342e4cb96b2f182a69d7432d9c111263d8ebdb677c4240cd9dc7a55

      SHA512

      24c8916053ecac16f1c1da0df4c2c3bba80b5956345cf6f035252b728356a630cd54f0576d25164179e528b98e15cc11da3e13ba0350f3160ef9f4e0d34c4cf7

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      081fa50c7fa24753b5e41a2de913d29d

      SHA1

      5fcb4a04aa2e2d3ee6f55f73f45615d71bd4e703

      SHA256

      3f9f71d00342e4cb96b2f182a69d7432d9c111263d8ebdb677c4240cd9dc7a55

      SHA512

      24c8916053ecac16f1c1da0df4c2c3bba80b5956345cf6f035252b728356a630cd54f0576d25164179e528b98e15cc11da3e13ba0350f3160ef9f4e0d34c4cf7

    • memory/956-162-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB

    • memory/956-163-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/956-169-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/956-171-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/956-172-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/956-173-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/956-174-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1508-156-0x00000000001F0000-0x00000000001F3000-memory.dmp

      Filesize

      12KB

    • memory/1508-157-0x0000000000200000-0x0000000000224000-memory.dmp

      Filesize

      144KB