uavgmq.exe

General
Target

uavgmq.exe

Filesize

1MB

Completed

21-11-2020 14:43

Score
10 /10
MD5

34f923e41d7da45ff5af8edb960a88eb

SHA1

0e29707a5261e82e87868bac2570e6c6ac2f04ab

SHA256

d3d024969e102aa98447050f0db324c22d6a67bbfafdfd26c1478d0f942933e1

Malware Config

Extracted

Family qakbot
Botnet notset
Campaign 1604404534
C2

67.6.55.77:443

89.136.39.108:443

2.50.58.76:443

188.25.158.61:443

45.63.107.192:995

45.32.154.10:443

94.52.160.116:443

45.63.107.192:2222

45.63.107.192:443

72.204.242.138:465

84.117.176.32:443

95.77.223.148:443

47.146.39.147:443

41.225.13.128:8443

80.14.209.42:2222

190.220.8.10:995

66.76.105.194:443

105.101.69.242:443

89.33.87.107:443

75.136.40.155:443

78.97.3.6:443

108.46.145.30:443

68.134.181.98:443

85.121.42.12:995

75.87.161.32:995

68.174.15.223:443

149.28.99.97:995

199.247.16.80:443

45.32.155.12:443

149.28.99.97:2222

149.28.99.97:443

70.168.130.172:995

93.86.252.177:995

50.244.112.10:995

59.99.36.238:443

185.246.9.69:995

208.99.100.129:443

41.97.25.63:443

72.186.1.237:443

59.99.36.241:443

45.32.155.12:2222

96.30.198.161:443

140.82.27.132:443

45.32.165.134:443

45.63.104.123:443

207.246.70.216:443

97.118.38.31:993

134.228.24.29:443

188.25.24.21:2222

2.89.17.127:995

Signatures 7

Filter: none

Persistence
  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Executes dropped EXE
    byabzee.exebyabzee.exe

    Reported IOCs

    pidprocess
    1244byabzee.exe
    396byabzee.exe
  • Loads dropped DLL
    uavgmq.exe

    Reported IOCs

    pidprocess
    1756uavgmq.exe
    1756uavgmq.exe
  • Creates scheduled task(s)
    schtasks.exe

    Description

    Schtasks is often used by malware for persistence or to perform post-infection execution.

    TTPs

    Scheduled Task

    Reported IOCs

    pidprocess
    1356schtasks.exe
  • Suspicious behavior: EnumeratesProcesses
    uavgmq.exeuavgmq.exebyabzee.exebyabzee.exeexplorer.exeuavgmq.exe

    Reported IOCs

    pidprocess
    1756uavgmq.exe
    1188uavgmq.exe
    1188uavgmq.exe
    1244byabzee.exe
    396byabzee.exe
    396byabzee.exe
    568explorer.exe
    568explorer.exe
    560uavgmq.exe
  • Suspicious behavior: MapViewOfSection
    byabzee.exe

    Reported IOCs

    pidprocess
    1244byabzee.exe
  • Suspicious use of WriteProcessMemory
    uavgmq.exebyabzee.exetaskeng.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 1756 wrote to memory of 11881756uavgmq.exeuavgmq.exe
    PID 1756 wrote to memory of 11881756uavgmq.exeuavgmq.exe
    PID 1756 wrote to memory of 11881756uavgmq.exeuavgmq.exe
    PID 1756 wrote to memory of 11881756uavgmq.exeuavgmq.exe
    PID 1756 wrote to memory of 12441756uavgmq.exebyabzee.exe
    PID 1756 wrote to memory of 12441756uavgmq.exebyabzee.exe
    PID 1756 wrote to memory of 12441756uavgmq.exebyabzee.exe
    PID 1756 wrote to memory of 12441756uavgmq.exebyabzee.exe
    PID 1756 wrote to memory of 13561756uavgmq.exeschtasks.exe
    PID 1756 wrote to memory of 13561756uavgmq.exeschtasks.exe
    PID 1756 wrote to memory of 13561756uavgmq.exeschtasks.exe
    PID 1756 wrote to memory of 13561756uavgmq.exeschtasks.exe
    PID 1244 wrote to memory of 3961244byabzee.exebyabzee.exe
    PID 1244 wrote to memory of 3961244byabzee.exebyabzee.exe
    PID 1244 wrote to memory of 3961244byabzee.exebyabzee.exe
    PID 1244 wrote to memory of 3961244byabzee.exebyabzee.exe
    PID 1244 wrote to memory of 5681244byabzee.exeexplorer.exe
    PID 1244 wrote to memory of 5681244byabzee.exeexplorer.exe
    PID 1244 wrote to memory of 5681244byabzee.exeexplorer.exe
    PID 1244 wrote to memory of 5681244byabzee.exeexplorer.exe
    PID 1244 wrote to memory of 5681244byabzee.exeexplorer.exe
    PID 1620 wrote to memory of 5601620taskeng.exeuavgmq.exe
    PID 1620 wrote to memory of 5601620taskeng.exeuavgmq.exe
    PID 1620 wrote to memory of 5601620taskeng.exeuavgmq.exe
    PID 1620 wrote to memory of 5601620taskeng.exeuavgmq.exe
Processes 8
  • C:\Users\Admin\AppData\Local\Temp\uavgmq.exe
    "C:\Users\Admin\AppData\Local\Temp\uavgmq.exe"
    Loads dropped DLL
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\uavgmq.exe
      C:\Users\Admin\AppData\Local\Temp\uavgmq.exe /C
      Suspicious behavior: EnumeratesProcesses
      PID:1188
    • C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe
      Executes dropped EXE
      Suspicious behavior: EnumeratesProcesses
      Suspicious behavior: MapViewOfSection
      Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe /C
        Executes dropped EXE
        Suspicious behavior: EnumeratesProcesses
        PID:396
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        Suspicious behavior: EnumeratesProcesses
        PID:568
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn wtqespzl /tr "\"C:\Users\Admin\AppData\Local\Temp\uavgmq.exe\" /I wtqespzl" /SC ONCE /Z /ST 14:47 /ET 14:59
      Creates scheduled task(s)
      PID:1356
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7D63C0B4-2EE4-49C2-A22B-99F58E76BB2E} S-1-5-18:NT AUTHORITY\System:Service:
    Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\uavgmq.exe
      C:\Users\Admin\AppData\Local\Temp\uavgmq.exe /I wtqespzl
      Suspicious behavior: EnumeratesProcesses
      PID:560
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation
                        Replay Monitor
                        00:00 00:00
                        Downloads
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.dat

                          MD5

                          a87a5325ee1bce0907f9da72c9d8e22e

                          SHA1

                          722e5fb04adef2dfbac2a5434b407b7890114e41

                          SHA256

                          c33ea6923a9e32d9e4c0626b677e8da7e66f3eac43930a9020cbba5c84645290

                          SHA512

                          ce5d3efa03f9571120aa573df1a01583b748e4d1939bf6e5e2f3963d2e695c268df2451541c6021896ecbbb9cc07050a0137dd78c9daca2a69eabe3d66667bee

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe

                          MD5

                          34f923e41d7da45ff5af8edb960a88eb

                          SHA1

                          0e29707a5261e82e87868bac2570e6c6ac2f04ab

                          SHA256

                          d3d024969e102aa98447050f0db324c22d6a67bbfafdfd26c1478d0f942933e1

                          SHA512

                          e0f6e31fb7d8ea312a0c3554b68c50d38f20c64d6af26d3809b2ac8944f180c68fc8806a1517d8fb2d780cb265326f63b1fdaf3c064d2bff76b7e96c6f0d8502

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe

                          MD5

                          34f923e41d7da45ff5af8edb960a88eb

                          SHA1

                          0e29707a5261e82e87868bac2570e6c6ac2f04ab

                          SHA256

                          d3d024969e102aa98447050f0db324c22d6a67bbfafdfd26c1478d0f942933e1

                          SHA512

                          e0f6e31fb7d8ea312a0c3554b68c50d38f20c64d6af26d3809b2ac8944f180c68fc8806a1517d8fb2d780cb265326f63b1fdaf3c064d2bff76b7e96c6f0d8502

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe

                          MD5

                          34f923e41d7da45ff5af8edb960a88eb

                          SHA1

                          0e29707a5261e82e87868bac2570e6c6ac2f04ab

                          SHA256

                          d3d024969e102aa98447050f0db324c22d6a67bbfafdfd26c1478d0f942933e1

                          SHA512

                          e0f6e31fb7d8ea312a0c3554b68c50d38f20c64d6af26d3809b2ac8944f180c68fc8806a1517d8fb2d780cb265326f63b1fdaf3c064d2bff76b7e96c6f0d8502

                        • \Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe

                          MD5

                          34f923e41d7da45ff5af8edb960a88eb

                          SHA1

                          0e29707a5261e82e87868bac2570e6c6ac2f04ab

                          SHA256

                          d3d024969e102aa98447050f0db324c22d6a67bbfafdfd26c1478d0f942933e1

                          SHA512

                          e0f6e31fb7d8ea312a0c3554b68c50d38f20c64d6af26d3809b2ac8944f180c68fc8806a1517d8fb2d780cb265326f63b1fdaf3c064d2bff76b7e96c6f0d8502

                        • \Users\Admin\AppData\Roaming\Microsoft\Sltqdatcyecb\byabzee.exe

                          MD5

                          34f923e41d7da45ff5af8edb960a88eb

                          SHA1

                          0e29707a5261e82e87868bac2570e6c6ac2f04ab

                          SHA256

                          d3d024969e102aa98447050f0db324c22d6a67bbfafdfd26c1478d0f942933e1

                          SHA512

                          e0f6e31fb7d8ea312a0c3554b68c50d38f20c64d6af26d3809b2ac8944f180c68fc8806a1517d8fb2d780cb265326f63b1fdaf3c064d2bff76b7e96c6f0d8502

                        • memory/396-10-0x00000000025C0000-0x00000000025D1000-memory.dmp

                        • memory/396-8-0x0000000000000000-mapping.dmp

                        • memory/560-14-0x0000000000000000-mapping.dmp

                        • memory/568-12-0x0000000000000000-mapping.dmp

                        • memory/1188-1-0x00000000025D0000-0x00000000025E1000-memory.dmp

                        • memory/1188-0-0x0000000000000000-mapping.dmp

                        • memory/1244-4-0x0000000000000000-mapping.dmp

                        • memory/1244-11-0x0000000000330000-0x000000000036A000-memory.dmp

                        • memory/1356-6-0x0000000000000000-mapping.dmp