Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 18:35

General

  • Target

    93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f.msi

  • Size

    1.9MB

  • MD5

    82b8bd90e500fb0bf878d6f430c5abec

  • SHA1

    f004c09428f2f18a145212a9e55eef3615858f9c

  • SHA256

    93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f

  • SHA512

    82b2e997bf5bc0d08ab8dd921aef3e8d620a61c26f86b6f481845ad694d7b97f65dfa42e1c18b83f0f827cad9df69a409b75d96793e5bd7124c26bc7cb07f881

  • SSDEEP

    49152:Ksjitd+vszAlozTy4g5r8+5eNBABxGNvXreD68f:rihTyfcXreO8f

Malware Config

Extracted

Family

qakbot

Botnet

tchk06

Campaign

1702463600

C2

45.138.74.191:443

65.108.218.24:443

Attributes
  • camp_date

    2023-12-13 10:33:20 +0000 UTC

Signatures

  • Detect Qakbot Payload 9 IoCs
  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\93a98b919aec23411ae62dba8d0d22f939da45dec19db2b4e7293124d8f1507f.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2672
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A0175A397EB8FC2EBEFB5EFEAAE37341 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3108
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4596
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 627E1E9FE45F7768D3EBE85022B4A2CD
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:372
      • C:\Windows\Installer\MSIF90.tmp
        "C:\Windows\Installer\MSIF90.tmp" /HideWindow rundll32 C:\Users\Admin\AppData\Roaming\KROST.dll,hvsi
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1680
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:1976
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\KROST.dll,hvsi
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\System32\wermgr.exe
        C:\Windows\System32\wermgr.exe
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:1156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57f9c2.rbs

      Filesize

      1KB

      MD5

      738731a7afdae00558a365964ad4ff40

      SHA1

      a7b735ccc9edce615a78ae9bf08e27ea339375c7

      SHA256

      f40504014a02662788ef8d16072cd74df4aac44ff55abf9f4026640ce3488888

      SHA512

      190d043f4ddc69d541e117c3db56ad2301bdad92e6c959c3c9571e4ceaf03d274bcf17abd63ea5618638b40715d615490d9b862ea94e816f21b683d6ff22232a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C42BC945025A34066DAB76EF3F80A05

      Filesize

      69KB

      MD5

      8b1fa6e4755be1606d6bad75f9f3b458

      SHA1

      b2bfd9b2d9d7052bb026f07aa3f5eeb13db4ce3b

      SHA256

      173b9db5b673e4345f4421bc48507165a25f73cbe475e0bbffc1fe56237addd5

      SHA512

      cbc9cd2a89341c80fcd56fd7b4145b1709e370c46e232ad756af3b5aa892fb2912f705ce774c5769f6d128b3f43569cf2f03db66d39c6e5f627cb76b06402c2f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

      Filesize

      727B

      MD5

      7e5e9912de7a985ff6257b5e3005de2c

      SHA1

      3d5557f4d0ce85b5d42ae97579b154c53648c418

      SHA256

      ec0bdea0fcc54be0a302cac5a2513186ccd5a9e1bd9de7c8dd81ce1773141571

      SHA512

      a2a8e2118dcbbeeb1c208fc34ac67d78ba85bddeffe3cc81668ce2b90d8cb992b2be881ed9db2c9847cebc597558060d2cec50337cef115bc2a07773076a6e4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C42BC945025A34066DAB76EF3F80A05

      Filesize

      314B

      MD5

      f20ce5f2ff7ccd000ddba979469467d2

      SHA1

      8579cbb23db855f153fa35364c627f5bd34fdd65

      SHA256

      c68735ee9c2554b2b170542da65fb7026b2de21d9418d42b9cbec27f1590823d

      SHA512

      ceba5d34b544dcca323d1693998fa58ebf11985b31f477673a97436c015e769b560636aa778dd6487021f16f000b6d262bed60073896e8cea45c9b6c04c51b4d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

      Filesize

      478B

      MD5

      a64e3e31513006315b53ebec5b77b209

      SHA1

      f83629c5f8c7e5c9df497e917b86dd97c82fadc0

      SHA256

      1ebe93ed0b52f9b63dd012a71d066f15820a15b637252114fc0c8985659c8c27

      SHA512

      9da2d9aa61b53005866980d68a23866ca7d8dc012ee684addab8a5200646cc5c09089457911a4b3fb72ab26d0a31eb1b1190b0638ea3838a8d6d4ea06f513d96

    • C:\Users\Admin\AppData\Local\Temp\MSIBA38.tmp

      Filesize

      721KB

      MD5

      5a1f2196056c0a06b79a77ae981c7761

      SHA1

      a880ae54395658f129e24732800e207ecd0b5603

      SHA256

      52f41817669af7ac55b1516894ee705245c3148f2997fa0e6617e9cc6353e41e

      SHA512

      9afc180ebc10c0ee0d7306f4b7085608a4e69321044d474691587bf7e63f945888781a9fc5e69568d351ac690b0335214bd04bdf5c75fd8a3bd1ec4be5d3475a

    • C:\Users\Admin\AppData\Roaming\KROST.dll

      Filesize

      459KB

      MD5

      0a29918110937641bbe4a2d5ee5e4272

      SHA1

      7d4a6976c1ece81e01d1f16ac5506266d5210734

      SHA256

      780be7a70ce3567ef268f6c768fc5a3d2510310c603bf481ebffd65e4fe95ff3

      SHA512

      998a6ee2fa6b345aeea72afaa91add8433e986a2678dbb8995ead786c30bdc00704c39c4857935b20669005b292736d50e1c6ad38901aa1f29db7b6a597fae3f

    • C:\Windows\Installer\MSIF90.tmp

      Filesize

      397KB

      MD5

      b41e1b0ae2ec215c568c395b0dbb738a

      SHA1

      90d8e50176a1f4436604468279f29a128723c64b

      SHA256

      a97e782c5612c1a9c8a56c56a943f6190fa7a73c346566860b519ef02efd0dca

      SHA512

      828d00ea08aa5c5d28b2e513687ee1ff910670f49f938064682e56da05544ba9d73ba9244f77b5df8acaeeb7b756d62f67e5acbc95bae86b4706f6324c4ccaba

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      576f110ef3633d7e402e192adbad18bb

      SHA1

      74db74034620e7a06e56aeb7502a20a8156fadff

      SHA256

      6f1cc626ccbc753ed65d113a3eb4ad69393c410a93c77024283247e080209c75

      SHA512

      c79d6a14163675bfd2bffb130a7e4438f4eb5969769f9f09c611d4682df05b225b71446a6f4e035612600080db4505bf8c87ba335ed73721e247075ca1bf2a67

    • \??\Volume{612d9cf5-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{49227c45-c17b-49b2-8fbf-db7177fccb05}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      806599a4503f2ded5ac05c134cd51998

      SHA1

      1eb01b3b4a340108371e29f71d56ca678dc6df0b

      SHA256

      3759a8f43c3c4d91e8fbc8dd5d44833c2d5af67d8806f9921935349d96345d42

      SHA512

      1e47ab705c294879e6b014d1790c93c90a0aa8672e1377aa03f5991ddc5884bc84cd00efd77f2f0a7ee9c3e1b97f8ef9a30a9fcdd2c5f2b263bfe221b67a6ce6

    • memory/1156-94-0x0000027373250000-0x000002737327E000-memory.dmp

      Filesize

      184KB

    • memory/1156-89-0x0000027373280000-0x0000027373282000-memory.dmp

      Filesize

      8KB

    • memory/1156-91-0x0000027373250000-0x000002737327E000-memory.dmp

      Filesize

      184KB

    • memory/1156-108-0x0000027373250000-0x000002737327E000-memory.dmp

      Filesize

      184KB

    • memory/1156-109-0x0000027373250000-0x000002737327E000-memory.dmp

      Filesize

      184KB

    • memory/1156-107-0x0000027373250000-0x000002737327E000-memory.dmp

      Filesize

      184KB

    • memory/1156-106-0x0000027373250000-0x000002737327E000-memory.dmp

      Filesize

      184KB

    • memory/1156-110-0x0000027373250000-0x000002737327E000-memory.dmp

      Filesize

      184KB

    • memory/4464-84-0x000002C82FBC0000-0x000002C82FBEF000-memory.dmp

      Filesize

      188KB

    • memory/4464-88-0x0000000180000000-0x000000018002E000-memory.dmp

      Filesize

      184KB

    • memory/4464-83-0x0000000069140000-0x00000000691BE000-memory.dmp

      Filesize

      504KB