Analysis
-
max time kernel
132s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe
Resource
win7-20240419-en
General
-
Target
2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe
-
Size
886KB
-
MD5
541c9a2c7fa4569aae5bb0e60848ec06
-
SHA1
fde1fbe34d8d0015f97d4c050ff8afc0656e141f
-
SHA256
8b9645288cef7f732104914779ea0aa46e918687d6b9bc7ee1fba95cbf5eb61e
-
SHA512
057a0488aa6a0486c103cd3826c6eb9b2d259312d86cc34b42a1251cee59713fc0080ae8b61cb985751d5ef0dcd89df411883ba09f72b26817f51f82b8accfb3
-
SSDEEP
24576:ROf6bQl8CqETla+mf8qxh0WbS/fu0HY66Lv54yk:ROfsCBlakutbS/fub66L+x
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Executes dropped EXE 1 IoCs
pid Process 1416 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe File opened (read-only) \??\VBoxMiniRdrDN Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 640 wrote to memory of 1416 640 2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe 83 PID 640 wrote to memory of 1416 640 2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe 83 PID 640 wrote to memory of 1416 640 2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_541c9a2c7fa4569aae5bb0e60848ec06_mafia_qakbot.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\a2WvKTQGYS\eeC0Zei7\Setup.exe"C:\Users\Admin\AppData\Local\Temp\a2WvKTQGYS\eeC0Zei7\Setup.exe" --relaunch2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies Internet Explorer settings
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
886KB
MD5541c9a2c7fa4569aae5bb0e60848ec06
SHA1fde1fbe34d8d0015f97d4c050ff8afc0656e141f
SHA2568b9645288cef7f732104914779ea0aa46e918687d6b9bc7ee1fba95cbf5eb61e
SHA512057a0488aa6a0486c103cd3826c6eb9b2d259312d86cc34b42a1251cee59713fc0080ae8b61cb985751d5ef0dcd89df411883ba09f72b26817f51f82b8accfb3