Analysis

  • max time kernel
    150s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2023 16:48

General

  • Target

    yohlef.msi

  • Size

    404KB

  • MD5

    1ddfcbdbe07f551e561be159a73d1c99

  • SHA1

    1ffea8c6ba224b4a9e6bb402b030a8c12f2523e2

  • SHA256

    30384e44c5df96b7809a94c2320caeb8ea94d6c9a2d0bf5a10206bee397f1c26

  • SHA512

    aa92c5f5fb036ce0d83afd7c804cc07940d62291b1c431249bb4fc982721ac117f7fde6fb28d7a30261e8ccdddca694879d382b2bb8b1d09179b4913bd495264

  • SSDEEP

    12288:MxCriEQzPJLNee9Lp1NjAyefvDz7n5DY:sdzFLPNjAyef7z7FY

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\yohlef.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:316
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Windows\SysWOW64\wermgr.exe
          C:\Windows\SysWOW64\wermgr.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1384
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
      2⤵
        PID:1068
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:592
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000049C" "00000000000004AC"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1544

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\6c7afd.rbs

      Filesize

      8KB

      MD5

      5dd83aed1f0fdf980c151535768f04f4

      SHA1

      05f182eb548ae5c7849fc79cf5d335e0263d95f8

      SHA256

      4b824f1e43f1fe04fa9d3c2490cc905e5411b7d75f45bc034eca4f10df2d9111

      SHA512

      6e86a1be0ab15d5dbc754b5c82b3e4400090ec69e914cb50773367a3c32f49573077e3ade649e28a63a8b5d7d65c01afec50558127852b2d6cd821ce1f0f68de

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      befad0feb0409d9676a166365e76a746

      SHA1

      b938403c00cbf4923cf89d39c7bfb4fa29c1ce29

      SHA256

      3449a237b8e97a0bc08f3867f884b68cf4d1770bfaa7c0834786d105a741f273

      SHA512

      4ee9832211a056d4185ed3232b4f16815816780f3e92b326957135c8ce8cdced73feada7686ec0747b907621fb96f1df975e6bf9e69fae8515d345c384d92cc8

    • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

      Filesize

      132B

      MD5

      0d4c9f15ce74465c59ae36a27f98c817

      SHA1

      9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

      SHA256

      d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

      SHA512

      9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

    • C:\Windows\Installer\6c7afb.msi

      Filesize

      404KB

      MD5

      1ddfcbdbe07f551e561be159a73d1c99

      SHA1

      1ffea8c6ba224b4a9e6bb402b030a8c12f2523e2

      SHA256

      30384e44c5df96b7809a94c2320caeb8ea94d6c9a2d0bf5a10206bee397f1c26

      SHA512

      aa92c5f5fb036ce0d83afd7c804cc07940d62291b1c431249bb4fc982721ac117f7fde6fb28d7a30261e8ccdddca694879d382b2bb8b1d09179b4913bd495264

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      befad0feb0409d9676a166365e76a746

      SHA1

      b938403c00cbf4923cf89d39c7bfb4fa29c1ce29

      SHA256

      3449a237b8e97a0bc08f3867f884b68cf4d1770bfaa7c0834786d105a741f273

      SHA512

      4ee9832211a056d4185ed3232b4f16815816780f3e92b326957135c8ce8cdced73feada7686ec0747b907621fb96f1df975e6bf9e69fae8515d345c384d92cc8

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      befad0feb0409d9676a166365e76a746

      SHA1

      b938403c00cbf4923cf89d39c7bfb4fa29c1ce29

      SHA256

      3449a237b8e97a0bc08f3867f884b68cf4d1770bfaa7c0834786d105a741f273

      SHA512

      4ee9832211a056d4185ed3232b4f16815816780f3e92b326957135c8ce8cdced73feada7686ec0747b907621fb96f1df975e6bf9e69fae8515d345c384d92cc8

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      befad0feb0409d9676a166365e76a746

      SHA1

      b938403c00cbf4923cf89d39c7bfb4fa29c1ce29

      SHA256

      3449a237b8e97a0bc08f3867f884b68cf4d1770bfaa7c0834786d105a741f273

      SHA512

      4ee9832211a056d4185ed3232b4f16815816780f3e92b326957135c8ce8cdced73feada7686ec0747b907621fb96f1df975e6bf9e69fae8515d345c384d92cc8

    • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

      Filesize

      752KB

      MD5

      befad0feb0409d9676a166365e76a746

      SHA1

      b938403c00cbf4923cf89d39c7bfb4fa29c1ce29

      SHA256

      3449a237b8e97a0bc08f3867f884b68cf4d1770bfaa7c0834786d105a741f273

      SHA512

      4ee9832211a056d4185ed3232b4f16815816780f3e92b326957135c8ce8cdced73feada7686ec0747b907621fb96f1df975e6bf9e69fae8515d345c384d92cc8

    • memory/1384-96-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1384-90-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1384-89-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB

    • memory/1384-97-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1384-98-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1384-99-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1384-100-0x0000000000080000-0x00000000000A4000-memory.dmp

      Filesize

      144KB

    • memory/1592-83-0x0000000000150000-0x0000000000174000-memory.dmp

      Filesize

      144KB

    • memory/1592-81-0x0000000000140000-0x0000000000143000-memory.dmp

      Filesize

      12KB