Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2023 17:51

General

  • Target

    ajijjq69a4i.msi

  • Size

    404KB

  • MD5

    4d9345ecd4f4536758a4dd378aff7ae5

  • SHA1

    dd7e9082e247a08141d167fd54a4a6d069768f55

  • SHA256

    37f05f27b5eb0d7debf1af4c9042a2ab6f306c94bdb6a365382100e99a92b321

  • SHA512

    bc3f088499409c5977b6dfa346dd5ac53a3db18f429dcf7e28fd5f0328eb52a0b948ffd46a75cc679a5fb6181e7dace07682af6e15e960234834eaa422a77c0c

  • SSDEEP

    6144:xnVPe+3R6gz8C1psDVw8EAYwzPJLNee9iZiYnCpqvY1dGujAyep5vDYs+vANHV:yxCriEQzPJLNee9Lp1NjAyefvDYs+gV

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ajijjq69a4i.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3372
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2544
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4896
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2216
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:3776
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:2632

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e56d538.rbs

        Filesize

        9KB

        MD5

        eeef269bcb27de781cac6da5bfd4ed8f

        SHA1

        ce50083474cca6c178e889bc8873e5a3e5abfb61

        SHA256

        b3ea304d4856577cf98113bc2d86ba4f2a441b260fcbe0bf77db42a9e9ac47f2

        SHA512

        f6e8cfb5088d495dfe14efde6928ba7fa090755471853f4bdc6b6c4f29946ce85ccbeeff8ebc0bfc8c627d9102f97657c52af186ac90acd1a6bf6ffe6cf01e9d

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        ef5580960c70965f57577aefae264474

        SHA1

        4cd6a65bc7f0230df3d79e5647c3e6fb052265e4

        SHA256

        f901b16f53f39d074b008bca1e4ffa6403ca3b9159b94bcafa9ae838a3ac425e

        SHA512

        5ea04aee0da2f3ad5b8a565387cffc0780be21d30e07c8fde044083c7e8e716ec851c9ec2b19259132615b0d1725d79be64a85eeee2f1a5d9c9153523c4a8ace

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        ef5580960c70965f57577aefae264474

        SHA1

        4cd6a65bc7f0230df3d79e5647c3e6fb052265e4

        SHA256

        f901b16f53f39d074b008bca1e4ffa6403ca3b9159b94bcafa9ae838a3ac425e

        SHA512

        5ea04aee0da2f3ad5b8a565387cffc0780be21d30e07c8fde044083c7e8e716ec851c9ec2b19259132615b0d1725d79be64a85eeee2f1a5d9c9153523c4a8ace

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\e56d537.msi

        Filesize

        404KB

        MD5

        4d9345ecd4f4536758a4dd378aff7ae5

        SHA1

        dd7e9082e247a08141d167fd54a4a6d069768f55

        SHA256

        37f05f27b5eb0d7debf1af4c9042a2ab6f306c94bdb6a365382100e99a92b321

        SHA512

        bc3f088499409c5977b6dfa346dd5ac53a3db18f429dcf7e28fd5f0328eb52a0b948ffd46a75cc679a5fb6181e7dace07682af6e15e960234834eaa422a77c0c

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        7bb343efc16025f9e506722041ab1fec

        SHA1

        06ed58958c1c420544b27a4ac6ba7b66b01f6619

        SHA256

        1289f7ea3a0bed4fe1ddbc09df34002273ecf742576fafaba80839b4438d37c1

        SHA512

        e3cf664d45061e78d98f617fa635345c2efd4272362d556f7d02fc516573091e98d18a83dd07fbe979337143e343f060215be773180b33a26e80431b41c30ad9

      • \??\Volume{61956d03-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5d429d21-8915-49d0-8590-62e72301bc7e}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        9f068c527ddb72a0e6332816aef680a1

        SHA1

        c76832954706846bba01daf65882b9784c3c2dfb

        SHA256

        e802e22fd82ce8c05131eb359c5bd43379cbcdbc0fca183ece7f6d6e597947a1

        SHA512

        b186c25730fde19c235fc1e46cd3d62ea25ed247e057474b46bfa4097d515cde8b818c5cbd766bea709f201e2ec55725894c0a02f2ed5e81c4353906e619fb6d

      • memory/2216-166-0x0000000000C40000-0x0000000000C64000-memory.dmp

        Filesize

        144KB

      • memory/2216-165-0x0000000000C70000-0x0000000000C72000-memory.dmp

        Filesize

        8KB

      • memory/2216-172-0x0000000000C40000-0x0000000000C64000-memory.dmp

        Filesize

        144KB

      • memory/2216-173-0x0000000000C40000-0x0000000000C64000-memory.dmp

        Filesize

        144KB

      • memory/2216-174-0x0000000000C40000-0x0000000000C64000-memory.dmp

        Filesize

        144KB

      • memory/2216-175-0x0000000000C40000-0x0000000000C64000-memory.dmp

        Filesize

        144KB

      • memory/2216-176-0x0000000000C40000-0x0000000000C64000-memory.dmp

        Filesize

        144KB

      • memory/4896-160-0x0000000000D40000-0x0000000000D64000-memory.dmp

        Filesize

        144KB

      • memory/4896-159-0x0000000000BE0000-0x0000000000BE3000-memory.dmp

        Filesize

        12KB