Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 16:38

General

  • Target

    ProjectFunding_477443_Jun01.js

  • Size

    1KB

  • MD5

    6eec3609ad79c0b5efd01946dbf1f90d

  • SHA1

    f59d16c3aaf41e61fc39fad32d315eaf438df6d3

  • SHA256

    d2e421d6f0d2b40181cd19075284df13bbdbab7db7c79cbec45cd5ae3304bb4f

  • SHA512

    7b8f9861ba7baa173fbacd222b95938490cefd19aee7553629133483adcb12764e0a8c233e06e9bf55c754bc12b017ed5f904ccbf6d0bf290e68dc00b46fb0d5

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ProjectFunding_477443_Jun01.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4456
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4236
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1640
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4916
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:1156
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:3004

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e572f6d.rbs

        Filesize

        9KB

        MD5

        ccc2ebd2d67f46afc42222a4301bb28c

        SHA1

        a2057d06e4f76d719669d257b3dd79ef2bf9661e

        SHA256

        1877d84463b8dd44e13e187f7286b5a44f0aee328cb354c02a76330404b53a74

        SHA512

        d46a3b70f8542b54a903a31bb3e9167770a20c16952b8e8c26e4b98a90f8d0441d6841f8fd49d05f9f818cf8ecee8244b42c1d36b997cb4240fe1804141c0f61

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        a3c115c9412963557aac45deaf2ca848

        SHA1

        ef7c3118336d46746fdbd3bba91901c699832655

        SHA256

        75010ec11a83b127edfeab14ac50dd54167d645c5bca677ae95dfbdcbebeba40

        SHA512

        888eb3186ada8d3a95624271f69526129d33640b40014d87e3c363ffdfd2a7f919b9fb7624667400b16d63a592f002a54f4bad30b242f59822312c3cea488ffa

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        a3c115c9412963557aac45deaf2ca848

        SHA1

        ef7c3118336d46746fdbd3bba91901c699832655

        SHA256

        75010ec11a83b127edfeab14ac50dd54167d645c5bca677ae95dfbdcbebeba40

        SHA512

        888eb3186ada8d3a95624271f69526129d33640b40014d87e3c363ffdfd2a7f919b9fb7624667400b16d63a592f002a54f4bad30b242f59822312c3cea488ffa

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\MSIC558.tmp

        Filesize

        404KB

        MD5

        e2d36f984d12b8f25ec701033cae6c86

        SHA1

        3c4266299b2aadb41cb4d989ed9cc0b08b9bd167

        SHA256

        715e78c2a3da2acd6db40e94c65d80e3de11fa30e5908fbf2cb74bbeeeb07a33

        SHA512

        d4cee60a1c62b50750659b5cd01a789baaca0b8288afd0b10ff7608004a8393b95ebd25199b85f652e30d533779cd2c5fe931f6c302a82b6d9679a1b46b47ba5

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        2a0f0a6084a3810166021e58a97c6158

        SHA1

        0f23167b6885cef12cbe17555dc9979d709ab390

        SHA256

        f3bbb2e77cb909a48a98c4ca4cb69d8d8ae10fde4973899b4f195005be484f0a

        SHA512

        3173cad2a37975a5c2b7ecdb78d65680007cf0d63475fd6aacea2859b64516530c1b0d1a438c20027b80b148a5a2e593343e3a548c4f78daf4b517cdb3407bb6

      • \??\Volume{af0fc727-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{29e3e0a2-f512-4656-bb66-7b5e6eafac4f}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        41751f7bb7017357c88d5ee81ff93b74

        SHA1

        aabc5afe2c039a64f070b35d7e422eca74801917

        SHA256

        9eb929713cd33a17d04497c02982279e994b128744f11c5d5d285ee99888251c

        SHA512

        1e004364554cac376aba8b03ac9fa3f848cc1a09dd9492ff3ca29ab3bf0a6211cc47f7b18853c3da34f917842472056fc2ddf2c5b1089ec89b116f3099df691f

      • memory/1640-168-0x0000000000A90000-0x0000000000A93000-memory.dmp

        Filesize

        12KB

      • memory/1640-169-0x0000000000AD0000-0x0000000000AF4000-memory.dmp

        Filesize

        144KB

      • memory/4916-175-0x0000000000F90000-0x0000000000FB4000-memory.dmp

        Filesize

        144KB

      • memory/4916-182-0x0000000000F90000-0x0000000000FB4000-memory.dmp

        Filesize

        144KB

      • memory/4916-183-0x0000000000F90000-0x0000000000FB4000-memory.dmp

        Filesize

        144KB

      • memory/4916-184-0x0000000000F90000-0x0000000000FB4000-memory.dmp

        Filesize

        144KB

      • memory/4916-185-0x0000000000F90000-0x0000000000FB4000-memory.dmp

        Filesize

        144KB

      • memory/4916-181-0x0000000000F90000-0x0000000000FB4000-memory.dmp

        Filesize

        144KB

      • memory/4916-174-0x0000000000FC0000-0x0000000000FC2000-memory.dmp

        Filesize

        8KB