Analysis

  • max time kernel
    1799s
  • max time network
    1694s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-09-2023 22:06

General

  • Target

    cb83a65a625a69bbae22d7dd87686dc2be8bd8a1f8bb40e318e20bc2a6c32a8e.html

  • Size

    1.1MB

  • MD5

    d79ac5762e68b8f19146c78c85b72d5e

  • SHA1

    899c8c030a88ebcc0b3e8482fbfe31e59d095641

  • SHA256

    cb83a65a625a69bbae22d7dd87686dc2be8bd8a1f8bb40e318e20bc2a6c32a8e

  • SHA512

    7d24d4faaab30600b863ccee8320fc7491e326e78cf88449a317af9658611f161c39a5dff65685d1c097efa022d1ac69b0aa9bde1d145440feaabe9d11a05521

  • SSDEEP

    24576:f3YV86hKO1diAGxF1iF8p+qnhwYk3mOnlBD:objWFoDqwmQX

Malware Config

Extracted

Family

qakbot

Version

403.780

Botnet

obama201

Campaign

1657815129

C2

70.46.220.114:443

179.111.8.52:32101

208.107.221.224:443

176.45.218.138:995

24.158.23.166:995

24.54.48.11:443

89.101.97.139:443

24.55.67.176:443

24.139.72.117:443

120.150.218.241:995

174.69.215.101:443

38.70.253.226:2222

41.228.22.180:443

217.165.157.202:995

172.115.177.204:2222

173.21.10.71:2222

69.14.172.24:443

47.23.89.60:993

104.34.212.7:32103

66.230.104.103:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\cb83a65a625a69bbae22d7dd87686dc2be8bd8a1f8bb40e318e20bc2a6c32a8e.html
    1⤵
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff966569758,0x7ff966569768,0x7ff966569778
      2⤵
        PID:3724
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:2
        2⤵
          PID:4152
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:8
          2⤵
            PID:2292
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:8
            2⤵
              PID:3816
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3252 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:1
              2⤵
                PID:4188
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3272 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:1
                2⤵
                  PID:436
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:8
                  2⤵
                    PID:4368
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:8
                    2⤵
                      PID:2740
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:8
                      2⤵
                        PID:1928
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 --field-trial-handle=1836,i,16374236179515687029,5898591311548994751,131072 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2120
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:3232
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:2252
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /q /c calc.exe
                          1⤵
                            PID:2980
                            • \??\E:\calc.exe
                              calc.exe
                              2⤵
                                PID:2912
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  C:\Windows\SysWOW64\regsvr32.exe 7533.dll
                                  3⤵
                                    PID:3676
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 684
                                      4⤵
                                      • Program crash
                                      PID:4688
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3676 -ip 3676
                                1⤵
                                  PID:1232

                                Network

                                MITRE ATT&CK Matrix ATT&CK v13

                                Discovery

                                Query Registry

                                2
                                T1012

                                Peripheral Device Discovery

                                1
                                T1120

                                System Information Discovery

                                2
                                T1082

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                  Filesize

                                  1KB

                                  MD5

                                  ab1232187df94727fd0de8fea667a808

                                  SHA1

                                  fa7788cc2e6452c5558a921e4d7789df53afef32

                                  SHA256

                                  cb30e6cdc938ecd028c5256a96c44b65d32670e2424729eac41e4f3ccb81834a

                                  SHA512

                                  620cab64ca568a8bd63437815c7ee6069beca1982f0c0e1e5072c159d274cb4d95419613538a34de913c377377f5a8d13a7deb9cefb59c08f186241833818858

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                  Filesize

                                  2KB

                                  MD5

                                  25a0f9af6831d722b5bbf37515116b56

                                  SHA1

                                  a36c63a242f33531279297b511ab7f615b293645

                                  SHA256

                                  88e1bd9675c34a62c57fa7f5e704e5fcd72a63fe836b995213632fac9c0df83f

                                  SHA512

                                  a9ce640b4fceae84adfc2ad06f773e917593c7f180928e02872aeb6884e95bf3e69f2d6481ebacc7acd9606f568866290be6eae7f5516cd56000470b56db81b1

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                  Filesize

                                  1KB

                                  MD5

                                  00ddde71c3ce10500a6fb2f2e6c709c5

                                  SHA1

                                  732784a5a1e7c2056e45b706955acfe8be48c5c5

                                  SHA256

                                  c3166989048805a49ef99675684fd7e3029342b347e37af31d9e3e2fbf2fe836

                                  SHA512

                                  2d39843d11c5558dc9c8b5b5a1dd1db2fa04f9c60beceada165119c4eb5819746e27b47cb9b8722a95485d94b64699a9191d62a92a77f569d837450657aaa4a5

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                  Filesize

                                  1KB

                                  MD5

                                  58e0d6d54ae6fda87ab1a79555696580

                                  SHA1

                                  ef04e2a7dacac42aa6cd0524bce3f77396c9aad4

                                  SHA256

                                  ccf62e7b6ef62aa88e885d73e3bd3923bf9e4ffbb4633043a2436187c122eb82

                                  SHA512

                                  d2830a2d6e547773db74bc95acb4d222c07d65f978bef314ca7c6727e3375cfcca4f6db5766a1260a7b3bc17cfc7d2f9f272d2e6442e5258907d32078a5d2bc9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  6KB

                                  MD5

                                  0b9174a0ceebd0e0cc36f34d13a50410

                                  SHA1

                                  822796d26df87985387695fc610106972541ec33

                                  SHA256

                                  d196c3b2622a737911562c98ab723476f56d80823f8a41a5fee6e26c1954d590

                                  SHA512

                                  f96fa220113fbe2a0bad4b5348c04de1392b22333db6b39ba19593eafa5cd818f1b49687d630d61e572e02a334fea7b4e403bc113343864d2273a6001a18a89a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                  Filesize

                                  97KB

                                  MD5

                                  c8a2686063d4ccfbcac44ab4607d80ed

                                  SHA1

                                  98373cbdb3405b30dc1d1bfe2c86889c135c9f46

                                  SHA256

                                  132d7e7c35d1b2a1d56e1dd21faaf428432e494a648c69725e04976f82828418

                                  SHA512

                                  60e6f7258441254d28f811a598e4124691c100a80ee7d4534260bc696bdacfb1bdd875e852a05c022a652e6a0c8e809bf28597929f97927dd6cdfff12f78b4cf

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • C:\Users\Admin\Downloads\Report Jul 14 47787.zip
                                  Filesize

                                  696KB

                                  MD5

                                  a4a09d3d5905910ad2a207522dcec67c

                                  SHA1

                                  8e7984a0af138aac5427b785e4385cdc6b9b8963

                                  SHA256

                                  197ee022aa311568cd98fee15baf2ee1a2f10ab32a6123b481a04ead41e80eee

                                  SHA512

                                  d80c3acbb3dab4ab159328cb1022a36ec72238678f0e647786a34842fb027f7f0d0f545729bfae9ff10a51a9198dc784b877c3ea99db6a0e81b60b11044c8973

                                • \??\pipe\crashpad_4660_AYEJNFTUQUXNKHRK
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/3676-47-0x0000000000FD0000-0x0000000000FD1000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/3676-61-0x0000000002BC0000-0x0000000002BE2000-memory.dmp
                                  Filesize

                                  136KB

                                • memory/3676-63-0x0000000002F30000-0x0000000002F59000-memory.dmp
                                  Filesize

                                  164KB

                                • memory/3676-60-0x0000000002BC0000-0x0000000002BE2000-memory.dmp
                                  Filesize

                                  136KB

                                • memory/3676-59-0x0000000002F30000-0x0000000002F59000-memory.dmp
                                  Filesize

                                  164KB

                                • memory/3676-48-0x0000000000400000-0x00000000004AC000-memory.dmp
                                  Filesize

                                  688KB