Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2023 17:35

General

  • Target

    ProjectFunding_843489_Jun01.js

  • Size

    1KB

  • MD5

    c7dfc0995de1e2d0c9fdd7737593b576

  • SHA1

    6d97a88690d6e5db8039f9dc6fbf316ca543d4a5

  • SHA256

    aaee1c741d06959cdf618c51a4b5370d89b1e8d2b9dff607c8a8b06ee640d347

  • SHA512

    224b865190b4199dba7cc7dfc0202db77de6bec63ee706268e8dfb60182bd8c48fcaecdc1a2e4544a623f2949ccd16ee900fbf6633269b7f39f5f2a041c8a268

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Modifies data under HKEY_USERS 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ProjectFunding_843489_Jun01.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1264
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
      2⤵
        PID:1892
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:864
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:940
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005BC" "00000000000003C0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6cb78f.rbs

      Filesize

      8KB

      MD5

      cc283dd90a8a85f4ce66a766ef84c3f7

      SHA1

      57977e4f2a3dba1a6d4ebe62652a5094b0a8cd6c

      SHA256

      b3d2a97f7da0ea63e35f0e116b425a376a5b26d3185c892881e3074b898f14fb

      SHA512

      872f5dcd961aebc75102c6c246c053926ff49e09ed6f263cdc329b185909e48bfae134b119d14ea704bbe2b3291db853a073cbe897d6a6f4026f5bcf6fbdf7df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      516ea03bf67f4ee8ff00e264376564aa

      SHA1

      85b3a8937222f04e4023a9504e24a75fc644b07d

      SHA256

      f53806877602ee78d669a9dce93f90812d75c3588dab8c0ac7c05209c042e779

      SHA512

      fcf2585611a2020489331f4a64a75ffc9a9f089632829b9325548166b779e7d8b5b40e71e7289bd7c041f41da3e53d21bf3505d22edad89c204487929817ca72

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      aae7c08e29026565dda96bf9ea80c4bf

      SHA1

      14b982d23af33c19a0991ef1233d32e1386b2092

      SHA256

      9545f57b2b22053987ae6075b50d0b01e41587d01501a6a946c8dcfd4dc1cb74

      SHA512

      324b51f63ac6766dcbad4af72d8137b2d2466445f00fb76ed38aa3367e5c6011fd6e86fdf507b794229464299965609313ac4e770b0b010967a56da5caebd8a6

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

      Filesize

      132B

      MD5

      0d4c9f15ce74465c59ae36a27f98c817

      SHA1

      9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

      SHA256

      d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

      SHA512

      9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

    • C:\Users\Admin\AppData\Local\Temp\Cab26E5.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar2833.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Windows\Installer\MSI29ED.tmp

      Filesize

      404KB

      MD5

      bad7a65666f6578956453dd1531029ea

      SHA1

      97753e369fd2c6fdb940c142528890250bf98f3e

      SHA256

      65263c09bf3fc30d3d1974bcefb48a1c7c3bdfe4ea2fe16ee4ad479ba75f7268

      SHA512

      1fb16186f26b7671c2d81f50eb1b0c1e9df500f0fc2d20824ff32cf9029581f50b1cd419563f031fe75afd383268a7ab073e3bd7ec4991957628c4708de26635

    • \??\PIPE\wkssvc

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      aae7c08e29026565dda96bf9ea80c4bf

      SHA1

      14b982d23af33c19a0991ef1233d32e1386b2092

      SHA256

      9545f57b2b22053987ae6075b50d0b01e41587d01501a6a946c8dcfd4dc1cb74

      SHA512

      324b51f63ac6766dcbad4af72d8137b2d2466445f00fb76ed38aa3367e5c6011fd6e86fdf507b794229464299965609313ac4e770b0b010967a56da5caebd8a6

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      aae7c08e29026565dda96bf9ea80c4bf

      SHA1

      14b982d23af33c19a0991ef1233d32e1386b2092

      SHA256

      9545f57b2b22053987ae6075b50d0b01e41587d01501a6a946c8dcfd4dc1cb74

      SHA512

      324b51f63ac6766dcbad4af72d8137b2d2466445f00fb76ed38aa3367e5c6011fd6e86fdf507b794229464299965609313ac4e770b0b010967a56da5caebd8a6

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      aae7c08e29026565dda96bf9ea80c4bf

      SHA1

      14b982d23af33c19a0991ef1233d32e1386b2092

      SHA256

      9545f57b2b22053987ae6075b50d0b01e41587d01501a6a946c8dcfd4dc1cb74

      SHA512

      324b51f63ac6766dcbad4af72d8137b2d2466445f00fb76ed38aa3367e5c6011fd6e86fdf507b794229464299965609313ac4e770b0b010967a56da5caebd8a6

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      aae7c08e29026565dda96bf9ea80c4bf

      SHA1

      14b982d23af33c19a0991ef1233d32e1386b2092

      SHA256

      9545f57b2b22053987ae6075b50d0b01e41587d01501a6a946c8dcfd4dc1cb74

      SHA512

      324b51f63ac6766dcbad4af72d8137b2d2466445f00fb76ed38aa3367e5c6011fd6e86fdf507b794229464299965609313ac4e770b0b010967a56da5caebd8a6

    • memory/864-165-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB

    • memory/864-166-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/864-172-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/864-173-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/864-174-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/864-175-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/864-176-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1968-158-0x00000000001D0000-0x00000000001F4000-memory.dmp

      Filesize

      144KB

    • memory/1968-157-0x0000000000170000-0x0000000000173000-memory.dmp

      Filesize

      12KB