Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-02-2021 10:20

General

  • Target

    qb.xls

  • Size

    67KB

  • MD5

    c9a898c5a3270a8afe2c5be7a1cda7d3

  • SHA1

    8fcdd739624c60795d18d0f2d769f70ffcaf04a3

  • SHA256

    e3154af64e8c0979c27748c4c445b3fff752188c780a46b98f4fdb96b028c85d

  • SHA512

    50e3b721b3d715ce6b3c3d85b34c127f81cf2f32654d7d59bf054b944b39578231279c2308106f36ee27235bd3a5d4595d786b8c90f7049ffab92d9bad970161

Malware Config

Extracted

Family

qakbot

Botnet

abc123

Campaign

1612275762

C2

196.151.252.84:443

216.201.162.158:443

83.110.12.140:2222

105.186.102.16:443

108.31.15.10:995

193.248.221.184:2222

68.225.60.77:995

197.45.110.165:995

89.3.198.238:443

81.97.154.100:443

81.214.126.173:2222

108.46.145.30:443

71.187.170.235:443

72.240.200.181:2222

81.88.254.62:443

98.240.24.57:443

86.97.8.249:443

75.136.40.155:443

79.129.121.81:995

37.211.90.175:995

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\qb.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\HYGFR.HYGF,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3996
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\HYGFR.HYGF1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 ..\HYGFR.HYGF1,DllRegisterServer
        3⤵
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn uwqimtlxic /tr "regsvr32.exe -s \"C:\Users\Admin\HYGFR.HYGF1\"" /SC ONCE /Z /ST 10:26 /ET 10:38
            5⤵
            • Creates scheduled task(s)
            PID:1524
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\HYGFR.HYGF2,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:660
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\HYGFR.HYGF3,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3824
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\HYGFR.HYGF4,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4100
  • \??\c:\windows\system32\regsvr32.exe
    regsvr32.exe -s "C:\Users\Admin\HYGFR.HYGF1"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Windows\SysWOW64\regsvr32.exe
      -s "C:\Users\Admin\HYGFR.HYGF1"
      2⤵
      • Loads dropped DLL
      PID:4256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 596
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4308

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\HYGFR.HYGF1
    MD5

    77f747e03c81e884840330e356969825

    SHA1

    032b47ec2f25613ca2dea8e26ed63f41c89747db

    SHA256

    dc0bac170788ea9646b9f980ad51adf8d210f01c653c89a9f884f77c013d6924

    SHA512

    79f7667f6efd3fd9ee26c253a707e15e2774541234e0a09793a6646c477109c1658a1408f26163a7f9784dd8b66d484e96570c4a5effac8a90299eb627dcf481

  • C:\Users\Admin\HYGFR.HYGF1
    MD5

    7593f350d5c3c9ee3f91dcedad359b32

    SHA1

    f2bd2db89bd31eaac17a85fb04e597f57f8e824b

    SHA256

    d82804f47fd8018a4709fca3f31246431e694d152c3e9bfdc311c6c2ceaa73ed

    SHA512

    e81bb719ced43a52eba2b4fd2fd955ba48e8ed2c2773051dd8fe72a8a0aed0c5198e671cf39d275d401fa8854b87976e3a314452264e0dd8514c9ae0817041c9

  • C:\Users\Admin\HYGFR.HYGF2
    MD5

    d40f0d3acb5e264dcaae5935dfe9152e

    SHA1

    f90886590579d0eccd74a802b1272b6455b600f6

    SHA256

    aeb69d38aa46a1cf16a0b18d9fd7ecd01c2ba17e7ba8d4468fda019f37a59987

    SHA512

    2e5cd3486dcd0c17d38697fb0de0a740930a751d5b338ef79df349ab1f471f5faa434cfbd2f8efb335855d77e00a380ab2c90daec494703e9be1ee78bcc3a157

  • \Users\Admin\HYGFR.HYGF1
    MD5

    7593f350d5c3c9ee3f91dcedad359b32

    SHA1

    f2bd2db89bd31eaac17a85fb04e597f57f8e824b

    SHA256

    d82804f47fd8018a4709fca3f31246431e694d152c3e9bfdc311c6c2ceaa73ed

    SHA512

    e81bb719ced43a52eba2b4fd2fd955ba48e8ed2c2773051dd8fe72a8a0aed0c5198e671cf39d275d401fa8854b87976e3a314452264e0dd8514c9ae0817041c9

  • \Users\Admin\HYGFR.HYGF1
    MD5

    77f747e03c81e884840330e356969825

    SHA1

    032b47ec2f25613ca2dea8e26ed63f41c89747db

    SHA256

    dc0bac170788ea9646b9f980ad51adf8d210f01c653c89a9f884f77c013d6924

    SHA512

    79f7667f6efd3fd9ee26c253a707e15e2774541234e0a09793a6646c477109c1658a1408f26163a7f9784dd8b66d484e96570c4a5effac8a90299eb627dcf481

  • memory/660-16-0x0000000000000000-mapping.dmp
  • memory/1524-17-0x0000000000000000-mapping.dmp
  • memory/2216-18-0x0000000002E00000-0x0000000002E35000-memory.dmp
    Filesize

    212KB

  • memory/2216-15-0x0000000002E00000-0x0000000002E35000-memory.dmp
    Filesize

    212KB

  • memory/2216-14-0x0000000000000000-mapping.dmp
  • memory/2324-10-0x0000000000000000-mapping.dmp
  • memory/2324-12-0x0000000000F10000-0x0000000000F44000-memory.dmp
    Filesize

    208KB

  • memory/2324-13-0x0000000000400000-0x0000000000435000-memory.dmp
    Filesize

    212KB

  • memory/3824-20-0x0000000000000000-mapping.dmp
  • memory/3840-8-0x0000000000000000-mapping.dmp
  • memory/3996-7-0x0000000000000000-mapping.dmp
  • memory/4000-5-0x00007FFCC06C0000-0x00007FFCC0CF7000-memory.dmp
    Filesize

    6.2MB

  • memory/4000-6-0x00007FFC9C810000-0x00007FFC9C820000-memory.dmp
    Filesize

    64KB

  • memory/4000-2-0x00007FFC9C810000-0x00007FFC9C820000-memory.dmp
    Filesize

    64KB

  • memory/4000-4-0x00007FFC9C810000-0x00007FFC9C820000-memory.dmp
    Filesize

    64KB

  • memory/4000-3-0x00007FFC9C810000-0x00007FFC9C820000-memory.dmp
    Filesize

    64KB

  • memory/4100-21-0x0000000000000000-mapping.dmp
  • memory/4256-23-0x0000000000000000-mapping.dmp
  • memory/4308-25-0x0000000003320000-0x0000000003321000-memory.dmp
    Filesize

    4KB