Analysis

  • max time kernel
    135s
  • resource
    win7v191014
  • submitted
    16-12-2019 17:39

General

  • Target

    b5b4.exe

  • Sample

    191216-2se5jb3s4x

  • SHA256

    b5b4b488a0a8f8ad6c5a738c2bc7dcbd7c198005d6adf2297b6f482b748440f6

Malware Config

Extracted

Family

qakbot

Campaign

1576221125

C2

72.187.35.131:443

188.61.134.98:2222

47.153.115.154:995

75.130.117.134:443

174.131.181.120:995

24.32.119.146:443

184.101.230.153:443

70.124.29.226:443

47.227.198.155:443

12.176.32.146:443

172.89.144.89:995

66.214.75.176:443

99.228.5.106:443

98.237.120.65:995

206.51.202.106:50002

50.247.230.33:995

96.37.137.42:443

73.226.220.56:443

70.164.39.91:443

104.152.16.45:995

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities

  • Turn off Windows Defender SpyNet reporting 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Loads dropped DLL 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5b4.exe
    "C:\Users\Admin\AppData\Local\Temp\b5b4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Loads dropped DLL
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\b5b4.exe
      C:\Users\Admin\AppData\Local\Temp\b5b4.exe /C
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1852
    • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: MapViewOfSection
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1892
      • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe /C
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1124
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2044
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn tcjhvmzz /tr "\"C:\Users\Admin\AppData\Local\Temp\b5b4.exe\" /I tcjhvmzz" /SC ONCE /Z /ST 18:41 /ET 18:53
      2⤵
        PID:640
    • C:\Windows\system32\conhost.exe
      \??\C:\Windows\system32\conhost.exe "2063053404-2854132222099762677-45583753-1949206537-75580183817319469623359341"
      1⤵
        PID:1028
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {8D511600-DB2F-492B-9EE5-D670D7FF52BA} S-1-5-18:NT AUTHORITY\System:Service:
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Users\Admin\AppData\Local\Temp\b5b4.exe
          C:\Users\Admin\AppData\Local\Temp\b5b4.exe /I tcjhvmzz
          2⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: EnumeratesProcesses
          • Loads dropped DLL
          PID:1216
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
            3⤵
              PID:1264
            • C:\Windows\system32\reg.exe
              C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
              3⤵
                PID:1168
              • C:\Windows\system32\reg.exe
                C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
                3⤵
                  PID:1992
                • C:\Windows\system32\reg.exe
                  C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
                  3⤵
                    PID:1924
                  • C:\Windows\system32\reg.exe
                    C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
                    3⤵
                      PID:1792
                    • C:\Windows\system32\reg.exe
                      C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
                      3⤵
                        PID:840
                      • C:\Windows\system32\reg.exe
                        C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
                        3⤵
                          PID:268
                        • C:\Windows\system32\reg.exe
                          C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
                          3⤵
                            PID:1456
                          • C:\Windows\system32\reg.exe
                            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv" /d "0"
                            3⤵
                              PID:1616
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                              C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1544
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe /C
                                4⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1788
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\b5b4.exe"
                              3⤵
                                PID:1460
                                • C:\Windows\system32\PING.EXE
                                  ping.exe -n 6 127.0.0.1
                                  4⤵
                                  • Runs ping.exe
                                  PID:932
                              • C:\Windows\system32\schtasks.exe
                                "C:\Windows\system32\schtasks.exe" /DELETE /F /TN tcjhvmzz
                                3⤵
                                  PID:576
                            • C:\Windows\system32\conhost.exe
                              \??\C:\Windows\system32\conhost.exe "1365882836-1110800745-7801866851380731011113141736411320799631137361410-557005805"
                              1⤵
                                PID:1120
                              • C:\Windows\system32\conhost.exe
                                \??\C:\Windows\system32\conhost.exe "-384530487-719684403-6971714381231329196-206039184250439643325348139-569546736"
                                1⤵
                                  PID:1108
                                • C:\Windows\system32\conhost.exe
                                  \??\C:\Windows\system32\conhost.exe "-875471951-189328531221931831-708082501-13365813741130860039929593856-1804527250"
                                  1⤵
                                    PID:2040
                                  • C:\Windows\system32\conhost.exe
                                    \??\C:\Windows\system32\conhost.exe "194973843082524135214779199022607934281944071045-3259787391683764858-697140228"
                                    1⤵
                                      PID:1896
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "-1904317397-16851386041491544489462358033985863903436148395-431719124-771391700"
                                      1⤵
                                        PID:1372
                                      • C:\Windows\system32\conhost.exe
                                        \??\C:\Windows\system32\conhost.exe "-191079676-1101064405-16346412851492502769-1686655768-646940616974144668-806571140"
                                        1⤵
                                          PID:596
                                        • C:\Windows\system32\conhost.exe
                                          \??\C:\Windows\system32\conhost.exe "-743888919-1584181610125198254695408328790441678-632671024529608171779644799"
                                          1⤵
                                            PID:768
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "15502433311259804779-5438740861779981695-18383386311070321465-1710798376902325144"
                                            1⤵
                                              PID:1540
                                            • C:\Windows\system32\conhost.exe
                                              \??\C:\Windows\system32\conhost.exe "725504720689926228-19575337191734287601-1615831929-1459951738-7727513911320410018"
                                              1⤵
                                                PID:1620
                                              • C:\Windows\system32\conhost.exe
                                                \??\C:\Windows\system32\conhost.exe "1548437458-154748918-17143604371787543675206105472-4768703452091858199577594281"
                                                1⤵
                                                  PID:1600
                                                • C:\Windows\system32\conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe "-773849690-187762793294557656920751508203383772682040431442-21428941761235425851"
                                                  1⤵
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1512

                                                Network

                                                MITRE ATT&CK Matrix ATT&CK v6

                                                Persistence

                                                Registry Run Keys / Startup Folder

                                                1
                                                T1060

                                                Defense Evasion

                                                Disabling Security Tools

                                                1
                                                T1089

                                                Modify Registry

                                                2
                                                T1112

                                                Discovery

                                                Remote System Discovery

                                                1
                                                T1018

                                                Query Registry

                                                1
                                                T1012

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.dat
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • \Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • \Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • \Users\Admin\AppData\Roaming\Microsoft\Pmzeovsv\qopabey.exe
                                                • memory/1124-6-0x0000000002550000-0x0000000002561000-memory.dmp
                                                  Filesize

                                                  68KB

                                                • memory/1788-12-0x00000000024A0000-0x00000000024B1000-memory.dmp
                                                  Filesize

                                                  68KB

                                                • memory/1852-0-0x0000000002560000-0x0000000002571000-memory.dmp
                                                  Filesize

                                                  68KB

                                                • memory/1892-7-0x0000000001E70000-0x0000000001F02000-memory.dmp
                                                  Filesize

                                                  584KB