Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 05:50

General

  • Target

    2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe

  • Size

    885KB

  • MD5

    64c1d4387a0973aa7d5a989312ce8754

  • SHA1

    59e56c4c9f8b3fe09d47a01289aba342e1b34be1

  • SHA256

    7caa0da0ccc56a5b38f0c4f7d86b6fb7239c79f8a06a5486948dc177d0ef00cd

  • SHA512

    b475da80690c0525422db2627073d3e10c1925d77cbbfa1ae460b6452aaf7b7b491d84022329725f333c29dfb605382c3c5ef929a39c2b4b76c187c458e02ddb

  • SSDEEP

    12288:qFluQIfi/C0T4mkdbWUhDHoDzf4Yzv2DLAfLwYXOBdzw6nPLhO8emCf4oGu94fSV:qVP/C0Umetu7XO4reBa6D8mCf4aFOG5

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_64c1d4387a0973aa7d5a989312ce8754_mafia_qakbot.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Loads dropped DLL
    • Checks for VirtualBox DLLs, possible anti-VM trick
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\a2RMn7xsTF\jQfHUHdW\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\a2RMn7xsTF\jQfHUHdW\Setup.exe" --relaunch
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Modifies Internet Explorer settings
      PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\a2RMn7xsTF\jQfHUHdW\Setup.exe

    Filesize

    885KB

    MD5

    64c1d4387a0973aa7d5a989312ce8754

    SHA1

    59e56c4c9f8b3fe09d47a01289aba342e1b34be1

    SHA256

    7caa0da0ccc56a5b38f0c4f7d86b6fb7239c79f8a06a5486948dc177d0ef00cd

    SHA512

    b475da80690c0525422db2627073d3e10c1925d77cbbfa1ae460b6452aaf7b7b491d84022329725f333c29dfb605382c3c5ef929a39c2b4b76c187c458e02ddb