Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:06

General

  • Target

    93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f.msi

  • Size

    1.9MB

  • MD5

    82b8bd90e500fb0bf878d6f430c5abec

  • SHA1

    f004c09428f2f18a145212a9e55eef3615858f9c

  • SHA256

    93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f

  • SHA512

    82b2e997bf5bc0d08ab8dd921aef3e8d620a61c26f86b6f481845ad694d7b97f65dfa42e1c18b83f0f827cad9df69a409b75d96793e5bd7124c26bc7cb07f881

  • SSDEEP

    49152:Ksjitd+vszAlozTy4g5r8+5eNBABxGNvXreD68f:rihTyfcXreO8f

Malware Config

Extracted

Family

qakbot

Botnet

tchk06

Campaign

1702463600

C2

45.138.74.191:443

65.108.218.24:443

Attributes
  • camp_date

    2023-12-13 10:33:20 +0000 UTC

Signatures

  • Detect Qakbot Payload 12 IoCs
  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4380
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 54129ACFD824214D01577CBB3F065C9C C
      2⤵
      • Loads dropped DLL
      PID:1100
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2256
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding C9017A8214087C5ABC3CD256264E22EC
        2⤵
        • Loads dropped DLL
        PID:4552
      • C:\Windows\Installer\MSID6AE.tmp
        "C:\Windows\Installer\MSID6AE.tmp" /HideWindow rundll32 C:\Users\Admin\AppData\Roaming\KROST.dll,hvsi
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3924
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3048
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\KROST.dll,hvsi
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Windows\System32\wermgr.exe
        C:\Windows\System32\wermgr.exe
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:2312

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57ce7c.rbs
      Filesize

      1KB

      MD5

      d993a9cbfc805742c2a831ed4a1ab90a

      SHA1

      1cc3e218190c6dbe72c1295cceccd0e86e30c3fe

      SHA256

      b7a4be699533f7c7c745683d22506eb9afc95251756b8f543488999f10e2039b

      SHA512

      ae49c5b82cd24e9c69cb615ac82ada1c6c823b5169961f216947abbeb05676f80f7a104eb3f4c7cd9ddc5f4d2adff92cd714e9a6616848bd4e305994eb3c5ef5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C42BC945025A34066DAB76EF3F80A05
      Filesize

      52KB

      MD5

      5bd63d118df94bdd463bb97b601f2214

      SHA1

      f59ed4f308754b59dc32f214465e62ec704e01bf

      SHA256

      d7c9b2da728943f4cf9ca560f6947a008b9911753922bf04fbbe1543378481a3

      SHA512

      515a1980fb3a46345dc5b68a16ad58f7620019fbf0cd3469e77155f1a418c4813be500e9a448ef976115f4cc7cf6ad7dffc43505d4119b530e3d5f1a8cb217e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1
      Filesize

      727B

      MD5

      7a3b8457313a521e0d44f91765a4e041

      SHA1

      4ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267

      SHA256

      2b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c

      SHA512

      7349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C42BC945025A34066DAB76EF3F80A05
      Filesize

      314B

      MD5

      184421896466f811b718d5ede308424d

      SHA1

      126a9d404b7c9182afd9ecdf3141c217a943bf2e

      SHA256

      ed18b68dd3db705ae0da28f378aae0f62f6f9dd46c0c16a89e4969a964d58f35

      SHA512

      532d4f01fb8f70bb9d095954f84b6c0e798d63e7913e11adcf2ce82bb3065b2a15dd265cb52a9a8738894cdb6558b3a6389461ebc34217c6ec60005d5e754647

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1
      Filesize

      478B

      MD5

      6c9871a917e28c18f7ee44bbb558dde6

      SHA1

      a326dcc3ff77e596e7113f32c56957e3d9a9a4dc

      SHA256

      bebb182ebe1c14852956d1b427b53dd6287daff4ff978462c1560177d03b93de

      SHA512

      bb36b088e7ce2afee20817925d6288cb21624828b7e3bcdedada07a64c8540ec416f9ac2315626977a86189105116da402d7e573b5cce439e5b08311e846f147

    • C:\Users\Admin\AppData\Local\Temp\MSI638C.tmp
      Filesize

      721KB

      MD5

      5a1f2196056c0a06b79a77ae981c7761

      SHA1

      a880ae54395658f129e24732800e207ecd0b5603

      SHA256

      52f41817669af7ac55b1516894ee705245c3148f2997fa0e6617e9cc6353e41e

      SHA512

      9afc180ebc10c0ee0d7306f4b7085608a4e69321044d474691587bf7e63f945888781a9fc5e69568d351ac690b0335214bd04bdf5c75fd8a3bd1ec4be5d3475a

    • C:\Users\Admin\AppData\Roaming\KROST.dll
      Filesize

      459KB

      MD5

      0a29918110937641bbe4a2d5ee5e4272

      SHA1

      7d4a6976c1ece81e01d1f16ac5506266d5210734

      SHA256

      780be7a70ce3567ef268f6c768fc5a3d2510310c603bf481ebffd65e4fe95ff3

      SHA512

      998a6ee2fa6b345aeea72afaa91add8433e986a2678dbb8995ead786c30bdc00704c39c4857935b20669005b292736d50e1c6ad38901aa1f29db7b6a597fae3f

    • C:\Windows\Installer\MSID6AE.tmp
      Filesize

      397KB

      MD5

      b41e1b0ae2ec215c568c395b0dbb738a

      SHA1

      90d8e50176a1f4436604468279f29a128723c64b

      SHA256

      a97e782c5612c1a9c8a56c56a943f6190fa7a73c346566860b519ef02efd0dca

      SHA512

      828d00ea08aa5c5d28b2e513687ee1ff910670f49f938064682e56da05544ba9d73ba9244f77b5df8acaeeb7b756d62f67e5acbc95bae86b4706f6324c4ccaba

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      Filesize

      23.7MB

      MD5

      b23f9585fa0fa67c850b0d9aac57c762

      SHA1

      748dfd4b9cfae2c5b4c43fb2d2c8a760f0a31630

      SHA256

      2f6361e898e93562ab28d5a6fbd972d20e884edd6b7b63c974177b889a851a04

      SHA512

      ab56c5e70482de028c966943055032dbbcd682c33702bf06c47c512e86f34ef5e0fe6bb80ff169a5900743e27727dad392f979e46ee8f42faa72822fe0bed0a4

    • \??\Volume{ef76cfc2-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e008560b-af87-4692-9c50-478335ae46e1}_OnDiskSnapshotProp
      Filesize

      6KB

      MD5

      4d3355c3152eafc2885984073dadac78

      SHA1

      632374108f5cf449a95d82ea8394c27365252d48

      SHA256

      f90ce218383a1bded3d1211cdbbf5a4d1c5c2f088fc8f6be90aa58c5973ea452

      SHA512

      43f30e6018c8bddc21f489ec851753dfb1e403568a93e85e69d283a66124ae2b5656f169ce8a6dc8c0e5792210f8785694e5e823c146a3e5f71faec1ac3b4c06

    • memory/2312-109-0x00000145F4680000-0x00000145F46AE000-memory.dmp
      Filesize

      184KB

    • memory/2312-108-0x00000145F4680000-0x00000145F46AE000-memory.dmp
      Filesize

      184KB

    • memory/2312-114-0x00000145F4680000-0x00000145F46AE000-memory.dmp
      Filesize

      184KB

    • memory/2312-89-0x00000145F46B0000-0x00000145F46B2000-memory.dmp
      Filesize

      8KB

    • memory/2312-90-0x00000145F4680000-0x00000145F46AE000-memory.dmp
      Filesize

      184KB

    • memory/2312-96-0x00000145F4680000-0x00000145F46AE000-memory.dmp
      Filesize

      184KB

    • memory/2312-111-0x00000145F4680000-0x00000145F46AE000-memory.dmp
      Filesize

      184KB

    • memory/2312-110-0x00000145F4680000-0x00000145F46AE000-memory.dmp
      Filesize

      184KB

    • memory/3340-85-0x000001EBE6D90000-0x000001EBE6DBD000-memory.dmp
      Filesize

      180KB

    • memory/3340-87-0x0000000180000000-0x000000018002E000-memory.dmp
      Filesize

      184KB

    • memory/3340-106-0x0000000180000000-0x000000018002E000-memory.dmp
      Filesize

      184KB

    • memory/3340-88-0x0000000180000000-0x000000018002E000-memory.dmp
      Filesize

      184KB

    • memory/3340-82-0x000001EBE6DC0000-0x000001EBE6DEF000-memory.dmp
      Filesize

      188KB

    • memory/3340-81-0x0000000069140000-0x00000000691BE000-memory.dmp
      Filesize

      504KB