Analysis Overview
SHA256
90b0ab153d270b14f799f948e2fd53b59ef187aeea2a9ac6d4925ba0619b7adf
Threat Level: Known bad
The file doc_pack-2016968056.xlsb was found to be: Known bad.
Malicious Activity Summary
Qakbot/Qbot
Executes dropped EXE
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Checks processor information in registry
Suspicious behavior: MapViewOfSection
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2020-10-29 04:00
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2020-10-29 04:00
Reported
2020-10-29 04:12
Platform
win7v20201028
Max time kernel
132s
Max time network
133s
Command Line
Signatures
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE | N/A |
Processes
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\doc_pack-2016968056.xlsb
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | mindsup.in | udp |
| N/A | 166.62.28.128:443 | mindsup.in | tcp |
| N/A | 8.8.8.8:53 | www.download.windowsupdate.com | udp |
| N/A | 205.185.216.42:80 | www.download.windowsupdate.com | tcp |
Files
memory/2012-0-0x000007FEF7040000-0x000007FEF72BA000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2020-10-29 04:00
Reported
2020-10-29 04:12
Platform
win10v20201028
Max time kernel
99s
Max time network
141s
Command Line
Signatures
Qakbot/Qbot
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\hgoitk\nkorpy\exlwhtih.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\doc_pack-2016968056.xlsb"
C:\hgoitk\nkorpy\exlwhtih.exe
"C:\hgoitk\nkorpy\exlwhtih.exe"
C:\hgoitk\nkorpy\exlwhtih.exe
C:\hgoitk\nkorpy\exlwhtih.exe /C
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn uhwbhky /tr "\"C:\hgoitk\nkorpy\exlwhtih.exe\" /I uhwbhky" /SC ONCE /Z /ST 05:09 /ET 05:21
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe /C
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | mindsup.in | udp |
| N/A | 166.62.28.128:443 | mindsup.in | tcp |
Files
memory/972-0-0x00007FFA6A520000-0x00007FFA6AB57000-memory.dmp
memory/1348-1-0x0000000000000000-mapping.dmp
C:\hgoitk\nkorpy\exlwhtih.exe
| MD5 | e7fb89ff479959bedf84eed00a642f07 |
| SHA1 | fa31fb2d426f237ccd67a78b848b40ee1c001166 |
| SHA256 | 9089e9c57d46d65745dce684b639571617890c5ddabdf049122314cd7b1c7b13 |
| SHA512 | 328f29767511d3f5d61e3d6462282bc7f8919ec02c9cd82c94c25018d9004af773cfe3734a9524dfad9909c7c0147d086dfa52931432241a0fd801ccaceeda6e |
C:\hgoitk\nkorpy\exlwhtih.exe
| MD5 | e7fb89ff479959bedf84eed00a642f07 |
| SHA1 | fa31fb2d426f237ccd67a78b848b40ee1c001166 |
| SHA256 | 9089e9c57d46d65745dce684b639571617890c5ddabdf049122314cd7b1c7b13 |
| SHA512 | 328f29767511d3f5d61e3d6462282bc7f8919ec02c9cd82c94c25018d9004af773cfe3734a9524dfad9909c7c0147d086dfa52931432241a0fd801ccaceeda6e |
memory/3108-4-0x0000000000000000-mapping.dmp
C:\hgoitk\nkorpy\exlwhtih.exe
| MD5 | e7fb89ff479959bedf84eed00a642f07 |
| SHA1 | fa31fb2d426f237ccd67a78b848b40ee1c001166 |
| SHA256 | 9089e9c57d46d65745dce684b639571617890c5ddabdf049122314cd7b1c7b13 |
| SHA512 | 328f29767511d3f5d61e3d6462282bc7f8919ec02c9cd82c94c25018d9004af773cfe3734a9524dfad9909c7c0147d086dfa52931432241a0fd801ccaceeda6e |
memory/3108-6-0x00000000027D0000-0x00000000027D1000-memory.dmp
memory/2136-7-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe
| MD5 | e7fb89ff479959bedf84eed00a642f07 |
| SHA1 | fa31fb2d426f237ccd67a78b848b40ee1c001166 |
| SHA256 | 9089e9c57d46d65745dce684b639571617890c5ddabdf049122314cd7b1c7b13 |
| SHA512 | 328f29767511d3f5d61e3d6462282bc7f8919ec02c9cd82c94c25018d9004af773cfe3734a9524dfad9909c7c0147d086dfa52931432241a0fd801ccaceeda6e |
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe
| MD5 | e7fb89ff479959bedf84eed00a642f07 |
| SHA1 | fa31fb2d426f237ccd67a78b848b40ee1c001166 |
| SHA256 | 9089e9c57d46d65745dce684b639571617890c5ddabdf049122314cd7b1c7b13 |
| SHA512 | 328f29767511d3f5d61e3d6462282bc7f8919ec02c9cd82c94c25018d9004af773cfe3734a9524dfad9909c7c0147d086dfa52931432241a0fd801ccaceeda6e |
memory/2080-10-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.exe
| MD5 | e7fb89ff479959bedf84eed00a642f07 |
| SHA1 | fa31fb2d426f237ccd67a78b848b40ee1c001166 |
| SHA256 | 9089e9c57d46d65745dce684b639571617890c5ddabdf049122314cd7b1c7b13 |
| SHA512 | 328f29767511d3f5d61e3d6462282bc7f8919ec02c9cd82c94c25018d9004af773cfe3734a9524dfad9909c7c0147d086dfa52931432241a0fd801ccaceeda6e |
memory/2152-11-0x0000000000000000-mapping.dmp
memory/2152-13-0x00000000026D0000-0x00000000026D1000-memory.dmp
memory/2136-14-0x00000000021E0000-0x0000000002217000-memory.dmp
memory/1416-15-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Aleeudwm\afnzavp.dat
| MD5 | af9307d2c91f58493c22a2c6bfadda29 |
| SHA1 | 14a81090fd4bb2454cdcba42f195cbf524acb8f9 |
| SHA256 | 79f887836522b297d3f02e776c70fe1131ec34025ccd9fa86686cd56a7289fe8 |
| SHA512 | 1e0fc5dbd416188c2d7fc2bd3e991fe252cfba30c30b71e53b189d04c55674f1dd233eb8fe6dcb3d13abb208f2aaa57fdd7676b9fe6000a96d66181226cb41c3 |