Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe
Resource
win7-20240221-en
General
-
Target
2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe
-
Size
885KB
-
MD5
64c1d4387a0973aa7d5a989312ce8754
-
SHA1
59e56c4c9f8b3fe09d47a01289aba342e1b34be1
-
SHA256
7caa0da0ccc56a5b38f0c4f7d86b6fb7239c79f8a06a5486948dc177d0ef00cd
-
SHA512
b475da80690c0525422db2627073d3e10c1925d77cbbfa1ae460b6452aaf7b7b491d84022329725f333c29dfb605382c3c5ef929a39c2b4b76c187c458e02ddb
-
SSDEEP
12288:qFluQIfi/C0T4mkdbWUhDHoDzf4Yzv2DLAfLwYXOBdzw6nPLhO8emCf4oGu94fSV:qVP/C0Umetu7XO4reBa6D8mCf4aFOG5
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exeSetup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Executes dropped EXE 1 IoCs
Processes:
Setup.exepid process 3000 Setup.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exepid process 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exeSetup.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe File opened (read-only) \??\VBoxMiniRdrDN Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
Setup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exedescription pid process target process PID 2084 wrote to memory of 3000 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Setup.exe PID 2084 wrote to memory of 3000 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Setup.exe PID 2084 wrote to memory of 3000 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Setup.exe PID 2084 wrote to memory of 3000 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Setup.exe PID 2084 wrote to memory of 3000 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Setup.exe PID 2084 wrote to memory of 3000 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Setup.exe PID 2084 wrote to memory of 3000 2084 2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Loads dropped DLL
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\a2RMn7xsTF\jQfHUHdW\Setup.exe"C:\Users\Admin\AppData\Local\Temp\a2RMn7xsTF\jQfHUHdW\Setup.exe" --relaunch2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies Internet Explorer settings
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
885KB
MD564c1d4387a0973aa7d5a989312ce8754
SHA159e56c4c9f8b3fe09d47a01289aba342e1b34be1
SHA2567caa0da0ccc56a5b38f0c4f7d86b6fb7239c79f8a06a5486948dc177d0ef00cd
SHA512b475da80690c0525422db2627073d3e10c1925d77cbbfa1ae460b6452aaf7b7b491d84022329725f333c29dfb605382c3c5ef929a39c2b4b76c187c458e02ddb