Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2023 11:17

General

  • Target

    ProjectFunding_547624_Jun01.js

  • Size

    1KB

  • MD5

    d958dec890f5a49330457862991ebee0

  • SHA1

    46fae61a6d8ccaa4cd07f0e25fb7285024f8e36c

  • SHA256

    3290ebf23a0f763607fa8c7a64b84da516d015adf663380dea9bf5ac19929543

  • SHA512

    d6d64699bd29586111573bb7e32bded0dfd48bca63ea9c87517f53f9eab22e3744e81f433f38ffc15dfe388564993bf4069a82e53fa04e748996a4cbfeab4d67

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Modifies data under HKEY_USERS 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ProjectFunding_547624_Jun01.js
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:748
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll,next
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1168
        • C:\Windows\SysWOW64\wermgr.exe
          C:\Windows\SysWOW64\wermgr.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1588
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs
      2⤵
        PID:1384
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
        PID:1784
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A0" "00000000000003B4"
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        PID:1608

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\6ddcea.rbs

        Filesize

        8KB

        MD5

        f942661916dc60438a7a90a9a1cb24db

        SHA1

        11aa422dafc3cd834e7b6ded55c8e04078487d9c

        SHA256

        56a7c58e485c41d5ec371022241e01fc7e1bdef091cde92a6ce797fc9e0164ae

        SHA512

        927394161669e2bd52883833e7b97ce310817ebd9acc52167ce1aef2cfec35172639745619591919b7afd3d7939f6e054d05d769406ac29f506e580df661383a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        62KB

        MD5

        3ac860860707baaf32469fa7cc7c0192

        SHA1

        c33c2acdaba0e6fa41fd2f00f186804722477639

        SHA256

        d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

        SHA512

        d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        fafbe2d4130db4af966c1ce595fdb65b

        SHA1

        732c1dd5497730879981c162e9ffa30d4d4f2903

        SHA256

        d57c625464f818e5c6e632189c6781cb9849653488baf69d007689379c630cfc

        SHA512

        5d92007ffcb7494e1456f859a3da4c141f2b5d6b0e5c66b820873341e220d39c12f3ab2774d5a540ba13289b7dabfd4ceab6a15e4d403d92d41e0d1bccbe7e39

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        5b3a664d2ccccf6faf97f3b20fcbc394

        SHA1

        2a91983f5b7cb06fefc9c817e62ebcb27dc49cc9

        SHA256

        a57358d032bfc007c174a5f9e8fb4c39ea8531d7fd77e1952db7c7de078e9907

        SHA512

        c3c08f9f6274b18b629c91ed5ec0af6292de636f20630bea512e97f9866fc5d0296313d4f7d8d815cdff7a73c106e343fdf56cf9b017f3e48ea81bdfe10db4ae

      • C:\Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\notify.vbs

        Filesize

        132B

        MD5

        0d4c9f15ce74465c59ae36a27f98c817

        SHA1

        9cce8eefa4d3d9c5e161c5dbb860cfe1489c6b1a

        SHA256

        d24e3399060b51f3a1c9d41a67de2601888a35c99da8db70070d757bb3f1913a

        SHA512

        9bed0eafc2cf2a2360850ca1070ffb04ac14f04c78379485998a93f45012b5c11cc7f6f68129f65b8b5f90437cb965908c6a1bb9d83a56b068d6bde1d5fdad1f

      • C:\Users\Admin\AppData\Local\Temp\Cab4B46.tmp

        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\Tar4C18.tmp

        Filesize

        164KB

        MD5

        4ff65ad929cd9a367680e0e5b1c08166

        SHA1

        c0af0d4396bd1f15c45f39d3b849ba444233b3a2

        SHA256

        c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

        SHA512

        f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

      • C:\Windows\Installer\MSI4D93.tmp

        Filesize

        404KB

        MD5

        a3c065e111432e342e8754c3e9da6562

        SHA1

        fa58f4cadeb9fced0c5c1fb6f2b127d63c5380ed

        SHA256

        85c68da65685531de1dd54b79e5bdc9317a55ecaa9d368512c0833cef524fdbc

        SHA512

        b02ccd5cc9c7c055d84bdb866f01b94726915bdeda1ce485fa87c10a90e5813fbd888d48efeeff11827123fd6c06d471434ba2710fc450825d9e424da504407f

      • \??\PIPE\wkssvc

        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        5b3a664d2ccccf6faf97f3b20fcbc394

        SHA1

        2a91983f5b7cb06fefc9c817e62ebcb27dc49cc9

        SHA256

        a57358d032bfc007c174a5f9e8fb4c39ea8531d7fd77e1952db7c7de078e9907

        SHA512

        c3c08f9f6274b18b629c91ed5ec0af6292de636f20630bea512e97f9866fc5d0296313d4f7d8d815cdff7a73c106e343fdf56cf9b017f3e48ea81bdfe10db4ae

      • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        5b3a664d2ccccf6faf97f3b20fcbc394

        SHA1

        2a91983f5b7cb06fefc9c817e62ebcb27dc49cc9

        SHA256

        a57358d032bfc007c174a5f9e8fb4c39ea8531d7fd77e1952db7c7de078e9907

        SHA512

        c3c08f9f6274b18b629c91ed5ec0af6292de636f20630bea512e97f9866fc5d0296313d4f7d8d815cdff7a73c106e343fdf56cf9b017f3e48ea81bdfe10db4ae

      • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        5b3a664d2ccccf6faf97f3b20fcbc394

        SHA1

        2a91983f5b7cb06fefc9c817e62ebcb27dc49cc9

        SHA256

        a57358d032bfc007c174a5f9e8fb4c39ea8531d7fd77e1952db7c7de078e9907

        SHA512

        c3c08f9f6274b18b629c91ed5ec0af6292de636f20630bea512e97f9866fc5d0296313d4f7d8d815cdff7a73c106e343fdf56cf9b017f3e48ea81bdfe10db4ae

      • \Users\Admin\AppData\Local\AdobeAcrobatPDFBrowserPlugin\main.dll

        Filesize

        752KB

        MD5

        5b3a664d2ccccf6faf97f3b20fcbc394

        SHA1

        2a91983f5b7cb06fefc9c817e62ebcb27dc49cc9

        SHA256

        a57358d032bfc007c174a5f9e8fb4c39ea8531d7fd77e1952db7c7de078e9907

        SHA512

        c3c08f9f6274b18b629c91ed5ec0af6292de636f20630bea512e97f9866fc5d0296313d4f7d8d815cdff7a73c106e343fdf56cf9b017f3e48ea81bdfe10db4ae

      • memory/1168-157-0x0000000000130000-0x0000000000133000-memory.dmp

        Filesize

        12KB

      • memory/1168-158-0x0000000000140000-0x0000000000164000-memory.dmp

        Filesize

        144KB

      • memory/1588-164-0x0000000000130000-0x0000000000132000-memory.dmp

        Filesize

        8KB

      • memory/1588-165-0x00000000000C0000-0x00000000000E4000-memory.dmp

        Filesize

        144KB

      • memory/1588-171-0x00000000000C0000-0x00000000000E4000-memory.dmp

        Filesize

        144KB

      • memory/1588-172-0x00000000000C0000-0x00000000000E4000-memory.dmp

        Filesize

        144KB

      • memory/1588-173-0x00000000000C0000-0x00000000000E4000-memory.dmp

        Filesize

        144KB

      • memory/1588-174-0x00000000000C0000-0x00000000000E4000-memory.dmp

        Filesize

        144KB

      • memory/1588-175-0x00000000000C0000-0x00000000000E4000-memory.dmp

        Filesize

        144KB