Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 16:49

General

  • Target

    09345699.js

  • Size

    1KB

  • MD5

    a657553449746c482dacfe3b19119b7a

  • SHA1

    630b815d443f8f7ef7e4c4c7c100de1cd8a7ed53

  • SHA256

    44e029dd6210c4906a82e1f16dd5ebed434efd225dafb92fc560e6ff6d1ee948

  • SHA512

    dea33536a5c5fe279ca1a8a3d4639be0f49d5ca3c21f4cbbda10c5d059837c2bc4c3917cdbddd0fc9f4a0773f325369b200f0df8e0035da6afab26f09502c321

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\09345699.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1452
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4084
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:4404
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\SysWOW64\wermgr.exe
              C:\Windows\SysWOW64\wermgr.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2384
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:1896

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e56e768.rbs

        Filesize

        9KB

        MD5

        379d34377a77bc33f20a6f5ccb7e6f82

        SHA1

        43b5dc4ccb006bf632d3a6be1ee6437ca4d8a7bc

        SHA256

        4adefbf654ed39c6ce87251ab5f7e3168ec45ef82259a4f6f814dd4f77cf1215

        SHA512

        979fdc69c0a1742181213ee75131c5a0652a0fe56c62cb1d4626dac36b60743ab42e7c4d7d2d5342b9d148b830cfa972a73076387a0151a5149dddb6e60e33be

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        f8090ce52ba92370700730571eae8324

        SHA1

        a23475ba810e5aa65de0b3b6b566a3407015e4a1

        SHA256

        34185364f0df3da1b86d02067a7e6641ac0e89cb8f03da38186c3bb2413c9dfb

        SHA512

        d0659e9b21dc8a8ef14543ff480133ef4c220e737dc91b13df6564c4f505ded6f51b7d6822cc7e08f00d711b2afce8042bba3148d70bbcc7cc4f65d74a6b967d

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        f8090ce52ba92370700730571eae8324

        SHA1

        a23475ba810e5aa65de0b3b6b566a3407015e4a1

        SHA256

        34185364f0df3da1b86d02067a7e6641ac0e89cb8f03da38186c3bb2413c9dfb

        SHA512

        d0659e9b21dc8a8ef14543ff480133ef4c220e737dc91b13df6564c4f505ded6f51b7d6822cc7e08f00d711b2afce8042bba3148d70bbcc7cc4f65d74a6b967d

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\MSI740C.tmp

        Filesize

        404KB

        MD5

        6ae8d648f8a9146b7f95b3a7073575d0

        SHA1

        f980c6e727aeb59bf3e6e77d3169448989995ad0

        SHA256

        e4740d41deca81aedd912cc1f1cb5a52dbf9a8d7dfdaa8adbcb6da119379fe3d

        SHA512

        50b30cee011918cd584c08b64871373edd5284af3cbaef04174ec48c63ab35ae8de8e85d35d1c2e9bfb389fcf1d9a7dcf0f246c958191beacd0e14557a65e054

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        b9d924a15f53d4fa564bd4d403d71d9a

        SHA1

        4b42857c08be8b39bb6840cec2bd56253a2f05ce

        SHA256

        9d4432c8ce4eef54dbf3c5fd45503c77941235465aea7e5230e26c58abc104ef

        SHA512

        75cb67a44baefa3dfc68dd83f88b1ff9d45d9447e76565a14a0c8a211b7e5bd28587a9468d1f5da0caae134448c8149bdf3570120dfe178e91818526f406e6bb

      • \??\Volume{4cc777a5-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{3465b196-19a7-4dc8-9a83-b28a3081ed43}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        a2e5fa84771bd7d437ce2e143fef16d3

        SHA1

        e67f90bb92fd5902bc0a073c630d1fdbc9667423

        SHA256

        0082d4cbaad0c100cf30acef0e7e896bddabaa55a89c102f7f3c95cc53b9d09d

        SHA512

        69795c027e619cdf7d9507786bf0349316286f17d942f615bba850b434a427dbc946f0cdc64e89f56d84288e40bd7eb6fee0e02a5140f9812f8ea69d95f8beba

      • memory/1532-165-0x00000000009A0000-0x00000000009A3000-memory.dmp

        Filesize

        12KB

      • memory/1532-166-0x00000000009B0000-0x00000000009D4000-memory.dmp

        Filesize

        144KB

      • memory/2384-172-0x0000000000DB0000-0x0000000000DD4000-memory.dmp

        Filesize

        144KB

      • memory/2384-179-0x0000000000DB0000-0x0000000000DD4000-memory.dmp

        Filesize

        144KB

      • memory/2384-180-0x0000000000DB0000-0x0000000000DD4000-memory.dmp

        Filesize

        144KB

      • memory/2384-181-0x0000000000DB0000-0x0000000000DD4000-memory.dmp

        Filesize

        144KB

      • memory/2384-182-0x0000000000DB0000-0x0000000000DD4000-memory.dmp

        Filesize

        144KB

      • memory/2384-178-0x0000000000DB0000-0x0000000000DD4000-memory.dmp

        Filesize

        144KB

      • memory/2384-171-0x0000000000DE0000-0x0000000000DE2000-memory.dmp

        Filesize

        8KB