Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    23-06-2023 17:21

General

  • Target

    BSN-40367275.js

  • Size

    342KB

  • MD5

    826bef7cc89f65b8c9422d3bc8b88980

  • SHA1

    34f366649a2daa6dee83dc972890f03dfec8b9b6

  • SHA256

    e5a4d28b196efa6e4c971985f28f9468ffe167a963358a46498992fbf529e5a9

  • SHA512

    78500e2bcf9035d9b61ca3042d7ba0d9c10f22f69dcd0bfff5ef0cce45582b2d2ac450d4eda4bb2f380154540efc81deefbcc54989b45b304b1c8f12c2aa1941

  • SSDEEP

    6144:bcFYID3OLgu44c/3F1amoAk5MuXvCG8YtnZ593e:fIS1xb6

Malware Config

Extracted

Family

qakbot

Version

404.1405

Botnet

obama271

Campaign

1687438904

C2

70.28.50.223:2083

103.141.50.79:995

184.182.66.109:443

122.184.143.82:443

91.254.145.252:443

37.14.229.220:2222

64.229.117.208:2222

77.126.99.230:443

87.252.106.235:995

12.172.173.82:32101

95.230.110.222:995

88.169.33.180:2222

70.28.50.223:1194

72.80.94.230:443

191.191.1.254:995

209.171.160.69:995

45.62.67.129:443

24.234.80.122:995

81.150.169.174:2222

121.121.100.202:995

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\BSN-40367275.js
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c mkdir C:\VPNStors\Krosters
      2⤵
        PID:1300
      • C:\Windows\System32\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\VPNStors\Krosters\Spote.OCCXX,zertc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\VPNStors\Krosters\Spote.OCCXX,zertc
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\wermgr.exe
            C:\Windows\SysWOW64\wermgr.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1604

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5d81f67971648c7fb9abeb79d04e760e

      SHA1

      2124cd67a3df45d4f838539d6d8c20f9090d4199

      SHA256

      3c4735cac5669318a2251c0c72c92f61ddb9672ddb56734f42625b07ddc36751

      SHA512

      1e324ea1d1729210c14d0cb37561de337b1cc99d822bd5fe12fe34b48b71f18033feffd4799868551c2f8560c3fbb59e2ab5f6cc2d95cb5a77b357c17219ffe5

    • C:\Users\Admin\AppData\Local\Temp\Cab2C61.tmp
      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\Tar2E18.tmp
      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\VPNStors\Krosters\Spote.OCCXX
      Filesize

      1.3MB

      MD5

      5b486c72d3d7aaabf513c5e78991ae1d

      SHA1

      3c051593d8f016199c7f1d1d9574cdbcef943c5e

      SHA256

      305e4b61366eee195bf47767ab445ebfc26a0899b2d3be952eafe92ab0c9060f

      SHA512

      5240ff510d3a2587713da76b174517a0e4e418c48b1c0458592393135d0accf2dc4c14fb8b00dcd7252be39b2601ccc69b07599f4722b0b1d6cee3e887f5903d

    • \VPNStors\Krosters\Spote.OCCXX
      Filesize

      1.3MB

      MD5

      5b486c72d3d7aaabf513c5e78991ae1d

      SHA1

      3c051593d8f016199c7f1d1d9574cdbcef943c5e

      SHA256

      305e4b61366eee195bf47767ab445ebfc26a0899b2d3be952eafe92ab0c9060f

      SHA512

      5240ff510d3a2587713da76b174517a0e4e418c48b1c0458592393135d0accf2dc4c14fb8b00dcd7252be39b2601ccc69b07599f4722b0b1d6cee3e887f5903d

    • memory/1604-141-0x00000000000B0000-0x00000000000B2000-memory.dmp
      Filesize

      8KB

    • memory/1604-142-0x0000000000080000-0x00000000000A4000-memory.dmp
      Filesize

      144KB

    • memory/1604-149-0x0000000000080000-0x00000000000A4000-memory.dmp
      Filesize

      144KB

    • memory/1604-150-0x0000000000080000-0x00000000000A4000-memory.dmp
      Filesize

      144KB

    • memory/1604-151-0x0000000000080000-0x00000000000A4000-memory.dmp
      Filesize

      144KB

    • memory/1604-152-0x0000000000080000-0x00000000000A4000-memory.dmp
      Filesize

      144KB

    • memory/1604-153-0x0000000000080000-0x00000000000A4000-memory.dmp
      Filesize

      144KB

    • memory/1756-135-0x0000000010000000-0x0000000010024000-memory.dmp
      Filesize

      144KB

    • memory/1756-140-0x0000000068DC0000-0x0000000068EEC000-memory.dmp
      Filesize

      1.2MB

    • memory/1756-134-0x00000000000F0000-0x00000000000F3000-memory.dmp
      Filesize

      12KB

    • memory/1756-148-0x0000000068DC0000-0x0000000068EEC000-memory.dmp
      Filesize

      1.2MB