Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    29-10-2020 04:37

General

  • Target

    doc_pack-2057423239.xlsb

  • Size

    24KB

  • MD5

    1ca3d78ae0a68c647fed606e813a19d4

  • SHA1

    33709fa32d59ce20ae0af207139859e5ae5cf86e

  • SHA256

    b4a4653db34bbf44ea2a87e8c288ad238447f6d11a5bce472badf93d3a52c0bd

  • SHA512

    74d4910649992bcbb381faa3ff9b94ee3f3c18d2783f9e86fe9cc4bbf861a90d51120d73f1a8cb072f9e88a08b2827e818e4095f3b3c4117a4636a2736448209

Malware Config

Extracted

Family

qakbot

Botnet

tr01

Campaign

1603793855

C2

50.104.68.223:443

89.137.211.239:443

95.77.223.148:443

197.37.69.138:993

68.174.15.223:443

103.238.231.35:443

36.77.151.211:443

72.16.56.171:443

45.47.65.191:443

189.231.212.189:443

106.51.52.111:443

24.55.66.125:443

39.37.247.97:995

108.190.151.108:2222

203.198.96.61:443

73.228.1.246:443

35.134.202.234:443

188.50.230.249:995

86.120.64.150:2222

5.14.126.153:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\doc_pack-2057423239.xlsb
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\hgoitk\nkorpy\exlwhtih.exe
      "C:\hgoitk\nkorpy\exlwhtih.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\hgoitk\nkorpy\exlwhtih.exe
        C:\hgoitk\nkorpy\exlwhtih.exe /C
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:680
      • C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe /C
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1956
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1596
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn pxrcisdxyv /tr "\"C:\hgoitk\nkorpy\exlwhtih.exe\" /I pxrcisdxyv" /SC ONCE /Z /ST 05:49 /ET 06:01
        3⤵
        • Creates scheduled task(s)
        PID:1820
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {80800814-292F-4D1A-9321-102AE8DD1EAC} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\hgoitk\nkorpy\exlwhtih.exe
      C:\hgoitk\nkorpy\exlwhtih.exe /I pxrcisdxyv
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.dat

    MD5

    bd27178747d7c98750fa96e38dabfa9b

    SHA1

    c1ca3dd3d1a92fd2e6688642468cd909e49fff65

    SHA256

    97e0c66f1f99548dfc3b8023605e734bd3d93da88f589ad82a5cc2dad0206bd1

    SHA512

    4437f6bafa8c4dd073a1ce8fa311f778247b41edf61be5d14533624545633db0528f75c7435f886d7c44d89973ed2113080a76a5b14e4622f9fb92226a31f6d7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • C:\hgoitk\nkorpy\exlwhtih.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • C:\hgoitk\nkorpy\exlwhtih.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • C:\hgoitk\nkorpy\exlwhtih.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • C:\hgoitk\nkorpy\exlwhtih.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • \Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • \Users\Admin\AppData\Roaming\Microsoft\Elpseghqre\epfyd.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • \hgoitk\nkorpy\exlwhtih.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • \hgoitk\nkorpy\exlwhtih.exe

    MD5

    96967658deb7d88da248e077dc383eca

    SHA1

    475c6525bf12dc043e8e20fac9b73b5e5c43165b

    SHA256

    926a329dedbfa54478aae338e79e8c6861e345084173b2bd54d677ba73ce4342

    SHA512

    542781099dc56c2cc7c685e87c3962cd65405a5b2e3ec24655e26f9156b2fdbebfd8f550d959b08bfb044cfd49e8bfcff6b3ccef891257177a71dafe7750cba2

  • memory/268-0-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp

    Filesize

    2.5MB

  • memory/680-8-0x0000000002520000-0x0000000002531000-memory.dmp

    Filesize

    68KB

  • memory/680-6-0x0000000000000000-mapping.dmp

  • memory/1056-11-0x0000000000000000-mapping.dmp

  • memory/1056-18-0x00000000003B0000-0x00000000003E7000-memory.dmp

    Filesize

    220KB

  • memory/1596-19-0x0000000000000000-mapping.dmp

  • memory/1632-21-0x0000000000000000-mapping.dmp

  • memory/1820-13-0x0000000000000000-mapping.dmp

  • memory/1864-3-0x0000000000000000-mapping.dmp

  • memory/1956-15-0x0000000000000000-mapping.dmp

  • memory/1956-17-0x00000000024B0000-0x00000000024C1000-memory.dmp

    Filesize

    68KB