Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2023 11:58

General

  • Target

    06343599.js

  • Size

    1KB

  • MD5

    d958dec890f5a49330457862991ebee0

  • SHA1

    46fae61a6d8ccaa4cd07f0e25fb7285024f8e36c

  • SHA256

    3290ebf23a0f763607fa8c7a64b84da516d015adf663380dea9bf5ac19929543

  • SHA512

    d6d64699bd29586111573bb7e32bded0dfd48bca63ea9c87517f53f9eab22e3744e81f433f38ffc15dfe388564993bf4069a82e53fa04e748996a4cbfeab4d67

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\06343599.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2724
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1524
      • C:\Windows\system32\wscript.exe
        wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
        2⤵
          PID:4952
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:932
            • C:\Windows\SysWOW64\wermgr.exe
              C:\Windows\SysWOW64\wermgr.exe
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2340
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:4756

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e5797dc.rbs

        Filesize

        9KB

        MD5

        1b942b8814e57cff213ffa119524ee46

        SHA1

        69ca95b362e42ddd2ac3958dce771ac273024aa8

        SHA256

        1f3c35bb316542815fe9512e1fedb33b83c37548e653081cb933741ce869ca04

        SHA512

        143e3e4b99864557e6d49a97736e49aaeeb652d92a71662d7cc168c67ebdf3c9b04aa29e9a540524ad77b3de4ebc46e6fda9fa31ffc552b69cab2ece2600c876

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        7ef6522096f05d2144bf938010551774

        SHA1

        4f0884a7326db0610b5520ece1a4a64d666e84cf

        SHA256

        7f64a81bd4b2d686f7abe3f0b58097f2b2792d7c32eea5fa225753e45eab1efa

        SHA512

        8f39c3c0fbb066394d15256aab3f005ba3099a38d7e6c05992d99595dbf8e146493bf5b7141f731e7b88c5097861c59343ab32215195bb6d408a75619699ce4c

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        7ef6522096f05d2144bf938010551774

        SHA1

        4f0884a7326db0610b5520ece1a4a64d666e84cf

        SHA256

        7f64a81bd4b2d686f7abe3f0b58097f2b2792d7c32eea5fa225753e45eab1efa

        SHA512

        8f39c3c0fbb066394d15256aab3f005ba3099a38d7e6c05992d99595dbf8e146493bf5b7141f731e7b88c5097861c59343ab32215195bb6d408a75619699ce4c

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Windows\Installer\MSI2CCD.tmp

        Filesize

        404KB

        MD5

        485d28c1a4dbd1c2ebf7a3b4518d7b43

        SHA1

        db920a3eb784c86c5fdf0ef25841c2fbd26466ab

        SHA256

        897a4b6be5d1ab3643756b547fda2e5064380c7f305c4ac6ba9883194f2776f1

        SHA512

        771aaaf626ac0cbfbb07c39d6c577374b34ba51cb2c56258cc82e78ac74f2f9512535e32326c28f4bcd263aa4384389ce8b01d96bc15130b0d32403264870b51

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        34bcc6767127e917e5b4c7ec2a321938

        SHA1

        919ac3745e43a8239e05af585656fbb65cad9320

        SHA256

        2623dd5fe62b4c25f2ec7bfd32971c55e1e97d161b8497a1337d62ca8f306bbc

        SHA512

        3f7726fdca0ecab689d1c7387dea9fe359e0a59820650c7356aafbf7e1b5190cc8e009d50af9aac651207dbbc626104fe81153802412bafc9eaa2d112fdda6f0

      • \??\Volume{7e74cb8c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{bca989e5-5e7c-4ac7-a443-b9bad2b1e36c}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        c1a8c4bea19e73349a96d92b7424eecc

        SHA1

        c0170b3ec70f9ccdfffa7434dec0c3fe164e6cb1

        SHA256

        e89ead2b1ca7278d5629621288bbada404326e10e88a68fef8eda6134f2abd86

        SHA512

        fba09e745366bb6c2e814f5f2fd58018115e378a36b4c96a55bf42335fd923d0e3db78e93270cfa85d821f8aab0166a91f0baa9f18725c5da0479ba947a6c166

      • memory/932-165-0x0000000001390000-0x0000000001393000-memory.dmp

        Filesize

        12KB

      • memory/932-166-0x0000000002D80000-0x0000000002DA4000-memory.dmp

        Filesize

        144KB

      • memory/2340-172-0x00000000004A0000-0x00000000004C4000-memory.dmp

        Filesize

        144KB

      • memory/2340-179-0x00000000004A0000-0x00000000004C4000-memory.dmp

        Filesize

        144KB

      • memory/2340-180-0x00000000004A0000-0x00000000004C4000-memory.dmp

        Filesize

        144KB

      • memory/2340-181-0x00000000004A0000-0x00000000004C4000-memory.dmp

        Filesize

        144KB

      • memory/2340-182-0x00000000004A0000-0x00000000004C4000-memory.dmp

        Filesize

        144KB

      • memory/2340-178-0x00000000004A0000-0x00000000004C4000-memory.dmp

        Filesize

        144KB

      • memory/2340-171-0x00000000004D0000-0x00000000004D2000-memory.dmp

        Filesize

        8KB