Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 16:48

General

  • Target

    yohlef.msi

  • Size

    404KB

  • MD5

    1ddfcbdbe07f551e561be159a73d1c99

  • SHA1

    1ffea8c6ba224b4a9e6bb402b030a8c12f2523e2

  • SHA256

    30384e44c5df96b7809a94c2320caeb8ea94d6c9a2d0bf5a10206bee397f1c26

  • SHA512

    aa92c5f5fb036ce0d83afd7c804cc07940d62291b1c431249bb4fc982721ac117f7fde6fb28d7a30261e8ccdddca694879d382b2bb8b1d09179b4913bd495264

  • SSDEEP

    12288:MxCriEQzPJLNee9Lp1NjAyefvDz7n5DY:sdzFLPNjAyef7z7FY

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\yohlef.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4660
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2584
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:4940
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4776
            • C:\Windows\SysWOW64\wermgr.exe
              C:\Windows\SysWOW64\wermgr.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4152
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:1356

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e56ede0.rbs

        Filesize

        9KB

        MD5

        a02037d8adecc4d9ba87ae5a97e5cb4a

        SHA1

        d731bab855f45e8c08ca97c501717d2e52749bda

        SHA256

        e455d2869edabbe03939ce0b68d3f0045659eab617f7b068f6741f4095f9b617

        SHA512

        a46fd0f4192d65479192d91c4b769d1620512d1ca267c56212b9952d9b1fb520b80814318a1eb4426cc961aab835d7a6665221d2ff323a384b5be2fcb6a38c1b

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        befad0feb0409d9676a166365e76a746

        SHA1

        b938403c00cbf4923cf89d39c7bfb4fa29c1ce29

        SHA256

        3449a237b8e97a0bc08f3867f884b68cf4d1770bfaa7c0834786d105a741f273

        SHA512

        4ee9832211a056d4185ed3232b4f16815816780f3e92b326957135c8ce8cdced73feada7686ec0747b907621fb96f1df975e6bf9e69fae8515d345c384d92cc8

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        befad0feb0409d9676a166365e76a746

        SHA1

        b938403c00cbf4923cf89d39c7bfb4fa29c1ce29

        SHA256

        3449a237b8e97a0bc08f3867f884b68cf4d1770bfaa7c0834786d105a741f273

        SHA512

        4ee9832211a056d4185ed3232b4f16815816780f3e92b326957135c8ce8cdced73feada7686ec0747b907621fb96f1df975e6bf9e69fae8515d345c384d92cc8

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\e56eddf.msi

        Filesize

        404KB

        MD5

        1ddfcbdbe07f551e561be159a73d1c99

        SHA1

        1ffea8c6ba224b4a9e6bb402b030a8c12f2523e2

        SHA256

        30384e44c5df96b7809a94c2320caeb8ea94d6c9a2d0bf5a10206bee397f1c26

        SHA512

        aa92c5f5fb036ce0d83afd7c804cc07940d62291b1c431249bb4fc982721ac117f7fde6fb28d7a30261e8ccdddca694879d382b2bb8b1d09179b4913bd495264

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        2b63d8e6a1f5841e9df1acbdf5d4195a

        SHA1

        0066752b85e22af95146a7e72ea52e72eb4b7baf

        SHA256

        2b273fc4d63a6dbceb3fd7390482e5764a6ba765902ed8cf733a8aaae832a121

        SHA512

        cb7f2a58ea9078334b203ac57fa501066ed9b75b5453a7781c620a0db142d996f954c95db2218f554f28d5d98280d23608ec92259f063c386da282487baaa958

      • \??\Volume{c9ab6598-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a96b8759-8781-4b41-b78e-34b8f0d68f45}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        57c2547ce405a8d7e2e1e52c1ebde32f

        SHA1

        2745c176c3fe3c48ddf6458555c709ee9ad0f59c

        SHA256

        6fb84a36555f474814b2be0e469e5fd22609cf0a44082d6ee2d911bd33410c3a

        SHA512

        917c99766f0122d6b0e17f80254157af2adadbdddaf41849fc7401bd9bde2d75d38be58e983e2397e243264b47f9831365ac8643c17577ff934f5bb9614e16ba

      • memory/4152-166-0x00000000010B0000-0x00000000010D4000-memory.dmp

        Filesize

        144KB

      • memory/4152-165-0x00000000010E0000-0x00000000010E2000-memory.dmp

        Filesize

        8KB

      • memory/4152-172-0x00000000010B0000-0x00000000010D4000-memory.dmp

        Filesize

        144KB

      • memory/4152-173-0x00000000010B0000-0x00000000010D4000-memory.dmp

        Filesize

        144KB

      • memory/4152-174-0x00000000010B0000-0x00000000010D4000-memory.dmp

        Filesize

        144KB

      • memory/4152-175-0x00000000010B0000-0x00000000010D4000-memory.dmp

        Filesize

        144KB

      • memory/4152-176-0x00000000010B0000-0x00000000010D4000-memory.dmp

        Filesize

        144KB

      • memory/4776-160-0x0000000002E70000-0x0000000002E94000-memory.dmp

        Filesize

        144KB

      • memory/4776-159-0x0000000002E60000-0x0000000002E63000-memory.dmp

        Filesize

        12KB