Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 17:35

General

  • Target

    ProjectFunding_843489_Jun01.js

  • Size

    1KB

  • MD5

    c7dfc0995de1e2d0c9fdd7737593b576

  • SHA1

    6d97a88690d6e5db8039f9dc6fbf316ca543d4a5

  • SHA256

    aaee1c741d06959cdf618c51a4b5370d89b1e8d2b9dff607c8a8b06ee640d347

  • SHA512

    224b865190b4199dba7cc7dfc0202db77de6bec63ee706268e8dfb60182bd8c48fcaecdc1a2e4544a623f2949ccd16ee900fbf6633269b7f39f5f2a041c8a268

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ProjectFunding_843489_Jun01.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5096
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4428
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:2736
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:924
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4888
            • C:\Windows\SysWOW64\wermgr.exe
              C:\Windows\SysWOW64\wermgr.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4812
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:3860

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e56e9e9.rbs

        Filesize

        9KB

        MD5

        314eaf836177274895dd2432bd2959dd

        SHA1

        cd0662d3db4a4396223571ec20d0d7a4aa5a6140

        SHA256

        f9f0af0a943f050bc37ff79b863ef68c86d2a169ffdf2c899e758b87d48b0569

        SHA512

        f430057bbec57f99d621d8696ede99cd27d6589088453d1d50354ac4d52a6d47abaa71f466dbdd4d667f1d9c6bf586beae9852965304a296cb235c55b2abc74e

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        66405338f124e7e85e95b35431ac9a33

        SHA1

        8aec6858ff913428ffbdb7bc5ab4dbf36cda8d3a

        SHA256

        7c6b62108f5fb30a499b5ea2d841014d56f0db9be319455eea2e8843c66e44ff

        SHA512

        e0ae8833a782ea698446bdcef8ef7b76530a475491a86c057dd5289cb653e48c12af1aba70dc3dfcca22e4dbc9593a8767452492f9301d7d3248c6428ee97d14

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        66405338f124e7e85e95b35431ac9a33

        SHA1

        8aec6858ff913428ffbdb7bc5ab4dbf36cda8d3a

        SHA256

        7c6b62108f5fb30a499b5ea2d841014d56f0db9be319455eea2e8843c66e44ff

        SHA512

        e0ae8833a782ea698446bdcef8ef7b76530a475491a86c057dd5289cb653e48c12af1aba70dc3dfcca22e4dbc9593a8767452492f9301d7d3248c6428ee97d14

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\MSI7A65.tmp

        Filesize

        404KB

        MD5

        f0db47ab7156e4a747acb8601a3e37bf

        SHA1

        822f93d63473e3f7a1c7b9ce50b31d76a9a6b438

        SHA256

        cb33ddf504dbcc23021e1fba3419faeb31fd921f11ee08c4f923b87ec0e6ceed

        SHA512

        3184b589f350cc92c49a3a76aa7ba51a10d51cee9bf573ce54addd1cc912ba524229f6573e7aaf2620ce1dadd7f5684519ca8ff5ddfa729e0f90a8cecd357594

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        b82ffb3bc4d8d486274dd6bda7d55c9f

        SHA1

        dd828994c15caa8b1a3523248864ffab1e3068c1

        SHA256

        d8047e0802350fc06c31bfa65ccd3a52186ea62d083c6e8d5ded42e72b392ef2

        SHA512

        916b7dce70979ba7387ae6be172e1bbef741e6fe07b08ad40f83d05122f583c2a86b64e85a58221ee47b1638e48a78948bfa9b0f9155fed375c6a82af87443de

      • \??\Volume{c9ab6598-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{659663e9-0767-44ec-8462-5b6fa7bf4374}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        b06c6406c8c6e85cad42462c49708204

        SHA1

        ec3e362352280a6790423654c246222c142f66e3

        SHA256

        f5a61959a9d66d6c0c5fdd7f498fe216e4e3e28921c7339d51abd0119817bb19

        SHA512

        2cc6e3f3766c00b25626dfc1e195a0a17a9f5a052d096392532124eebaafd93d35ff968652b064b4d8cf3bd548b0164997e86ae7b4aed45222aa962e69813a15

      • memory/4812-172-0x0000000001060000-0x0000000001084000-memory.dmp

        Filesize

        144KB

      • memory/4812-171-0x0000000001090000-0x0000000001092000-memory.dmp

        Filesize

        8KB

      • memory/4812-178-0x0000000001060000-0x0000000001084000-memory.dmp

        Filesize

        144KB

      • memory/4812-179-0x0000000001060000-0x0000000001084000-memory.dmp

        Filesize

        144KB

      • memory/4812-180-0x0000000001060000-0x0000000001084000-memory.dmp

        Filesize

        144KB

      • memory/4812-181-0x0000000001060000-0x0000000001084000-memory.dmp

        Filesize

        144KB

      • memory/4812-182-0x0000000001060000-0x0000000001084000-memory.dmp

        Filesize

        144KB

      • memory/4888-166-0x0000000002870000-0x0000000002894000-memory.dmp

        Filesize

        144KB

      • memory/4888-165-0x0000000001230000-0x0000000001233000-memory.dmp

        Filesize

        12KB