Analysis

  • max time kernel
    299s
  • max time network
    264s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 16:44

General

  • Target

    83648865d6015e61bf4c45a3aa17b8ce86951bcfc28a70fe36cfc2f597984c4a.msi

  • Size

    404KB

  • MD5

    e381e9903abc3b3c725c53838467a257

  • SHA1

    e14b0b365ba6cca98f6f7380617ed1362fee6b89

  • SHA256

    83648865d6015e61bf4c45a3aa17b8ce86951bcfc28a70fe36cfc2f597984c4a

  • SHA512

    d09765cd4e69471b3b7be51c2d0c6c2178c45101fd5bcffbd2cbbd10958596c1eb0653857bf75ae621e064109756b33df6384bd55179f844d760dcf0df41d3ca

  • SSDEEP

    6144:MNVPe+3R6gz8C1psDVw8EAYwzPJLNee9iZiYnCpqvY1dGujAyep5vDhPLu6RAeHE:xxCriEQzPJLNee9Lp1NjAyefvDI6RjE

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\83648865d6015e61bf4c45a3aa17b8ce86951bcfc28a70fe36cfc2f597984c4a.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:544
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:5116
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3924
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3032
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1596
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:1244
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:4672

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e56e758.rbs

        Filesize

        9KB

        MD5

        bdb89c266187de7cf94d21a1b1f4eb2e

        SHA1

        7e91aead263526362432d8f88c2e0e97116eb7b4

        SHA256

        930eef4450e8d819a15a196598b45098b07c5d56e3498f40132f7ca1bd50e92f

        SHA512

        2ec98d0594aa6b9f48d6c0b9bf53e708fdcea62385595a13e978d85d8aee7df49baaa38b7ba0840da54b1cc8599fe9ad2aa8f2b16edfe88c362475fd56edf675

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        2185add4a967f3d974a73fc9b842633b

        SHA1

        ec64fe7e0409efbf0854c2158569f2f6d6c053a3

        SHA256

        8919918640ed4cf30c6a6a200a7ed768b38d11e247a17266816fa96411404e03

        SHA512

        e9a9b55ead2afbfb15183394ffb949ad253eabcd756f22561d4b1aa4838a64a057d50343c6518c2c940af22e77a0a0dcbe562a3e138d4766838d08fe11af7066

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        2185add4a967f3d974a73fc9b842633b

        SHA1

        ec64fe7e0409efbf0854c2158569f2f6d6c053a3

        SHA256

        8919918640ed4cf30c6a6a200a7ed768b38d11e247a17266816fa96411404e03

        SHA512

        e9a9b55ead2afbfb15183394ffb949ad253eabcd756f22561d4b1aa4838a64a057d50343c6518c2c940af22e77a0a0dcbe562a3e138d4766838d08fe11af7066

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\e56e757.msi

        Filesize

        404KB

        MD5

        e381e9903abc3b3c725c53838467a257

        SHA1

        e14b0b365ba6cca98f6f7380617ed1362fee6b89

        SHA256

        83648865d6015e61bf4c45a3aa17b8ce86951bcfc28a70fe36cfc2f597984c4a

        SHA512

        d09765cd4e69471b3b7be51c2d0c6c2178c45101fd5bcffbd2cbbd10958596c1eb0653857bf75ae621e064109756b33df6384bd55179f844d760dcf0df41d3ca

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        82dd66aa224dea1ad210d939ea651952

        SHA1

        f65318c53d8c4b7e4acfd01278a6d5cab19d6453

        SHA256

        78979e24d9bb51ee7b1bc17fd4a1a46fe8dfa5f39f823bdce4b824439d3fd040

        SHA512

        42c9007f4564d6b5de3e825dd33b26d2f32f7dfe29f2a393b53127f153b1c6f96de34649e2a6a603ee2efb4596ac68d80272d8511f43a329f5ced5bf3b04c08f

      • \??\Volume{af0fc727-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5c6bc1a0-ba0a-4d42-9a05-fea9c4b09b66}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        d4dbff5df7fd53ebbaf3d6950d18e06b

        SHA1

        2cb1530d7ab75d029b72258176c132d7bff8a501

        SHA256

        79d9fb2a602a7d45287bc4bbac969275811ca5c8fe8cb0d6b3ec84590b3c5a82

        SHA512

        fb9632a399a0736c239b0c0a26d64fd68ab1a8bd68d88fd2fec3495e8dcda95991196de7233be7dbe19b494445a41f95bf89434b9d2e60293d1b0096d4a3e176

      • memory/1596-167-0x0000000000E80000-0x0000000000E82000-memory.dmp

        Filesize

        8KB

      • memory/1596-168-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/1596-174-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/1596-175-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/1596-176-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/1596-177-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/1596-178-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/1596-184-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/1596-185-0x0000000000E50000-0x0000000000E74000-memory.dmp

        Filesize

        144KB

      • memory/3032-160-0x0000000002430000-0x0000000002454000-memory.dmp

        Filesize

        144KB

      • memory/3032-159-0x0000000000970000-0x0000000000973000-memory.dmp

        Filesize

        12KB