Analysis

  • max time kernel
    150s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-02-2021 18:45

General

  • Target

    bid,02.21.doc

  • Size

    95KB

  • MD5

    8d4ca32c865cbc75fb529bc64730c453

  • SHA1

    334c4352dbda3759ca503a6118bc2ddb09b6f9d7

  • SHA256

    53b9aaed11c3bff95b8baeef19467b11ab6ef362e2f8b550ee531babbddd9e0f

  • SHA512

    3bd039c6d748008d76d5095be0130763e74dd68929e1f8878c557e92bff5742731fdfddbb38171b4f6c13ed42e7339ea4bd54c975d6f36015ea6f7b2bfb66f50

Malware Config

Extracted

Family

qakbot

Botnet

krk01

Campaign

1611569149

C2

31.5.21.66:995

89.3.198.238:443

202.188.138.162:443

188.24.128.253:443

175.141.219.71:443

151.60.15.183:443

184.189.122.72:443

80.227.5.70:443

140.82.49.12:443

89.211.241.100:995

81.97.154.100:443

77.27.174.49:995

92.154.83.96:2078

42.3.8.54:443

71.187.170.235:443

46.153.36.53:995

71.182.142.63:443

105.186.102.16:443

50.244.112.106:443

78.63.226.32:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bid,02.21.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\programdata\xml.com
      "C:\programdata\xml.com" process list /format : "c:\programdata\i.xsl"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 c:\programdata\1271.jpg
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
            PID:1008
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1812

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • C:\programdata\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \??\c:\programdata\1271.jpg
        MD5

        4a2a46cfca30f739994362c22f0d2f46

        SHA1

        f0c75c3e93907f66e1f747d1eb099d144f30deeb

        SHA256

        c335c63f7587348d5c65235379f76f5298fe90264857675cf08539a6be9e990b

        SHA512

        1024ef1bff08cf739c90e04fae00e4ab1fb96a6bd77baebb258901a86d4626149c9197cfe4f025e7e0e4bce7db53ed5d80e4fadf83d7680832a640bda6876a5b

      • \??\c:\programdata\i.xsl
        MD5

        3bfe49781b0c5ebfce69bf1815076111

        SHA1

        12af9552ed24477939ad337973643ec758e62721

        SHA256

        5243d6b20c66df6fb8e02b17b4963a8b33d4b907209fa08bf024becb341628a3

        SHA512

        65a8535574bad660a9b4bc8b1bbcb0e479a40843c51432f8313248064bb6457bd2a9846c5a6fc382090942efb3b6ac9860a67a3876ff40a20923347ab45c0e3c

      • \ProgramData\1271.jpg
        MD5

        4a2a46cfca30f739994362c22f0d2f46

        SHA1

        f0c75c3e93907f66e1f747d1eb099d144f30deeb

        SHA256

        c335c63f7587348d5c65235379f76f5298fe90264857675cf08539a6be9e990b

        SHA512

        1024ef1bff08cf739c90e04fae00e4ab1fb96a6bd77baebb258901a86d4626149c9197cfe4f025e7e0e4bce7db53ed5d80e4fadf83d7680832a640bda6876a5b

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • memory/316-17-0x0000000000000000-mapping.dmp
      • memory/316-21-0x000000006B6C0000-0x000000006B6F5000-memory.dmp
        Filesize

        212KB

      • memory/316-27-0x00000000003C0000-0x00000000003C1000-memory.dmp
        Filesize

        4KB

      • memory/316-22-0x00000000001F0000-0x00000000001F1000-memory.dmp
        Filesize

        4KB

      • memory/316-18-0x00000000756A1000-0x00000000756A3000-memory.dmp
        Filesize

        8KB

      • memory/1008-23-0x0000000000000000-mapping.dmp
      • memory/1008-25-0x000000006B151000-0x000000006B153000-memory.dmp
        Filesize

        8KB

      • memory/1008-26-0x0000000000080000-0x00000000000B5000-memory.dmp
        Filesize

        212KB

      • memory/1060-15-0x000007FEF68D0000-0x000007FEF6B4A000-memory.dmp
        Filesize

        2.5MB

      • memory/1272-9-0x0000000000000000-mapping.dmp
      • memory/1684-2-0x0000000072DC1000-0x0000000072DC4000-memory.dmp
        Filesize

        12KB

      • memory/1684-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1684-3-0x0000000070841000-0x0000000070843000-memory.dmp
        Filesize

        8KB

      • memory/1684-11-0x00000000060D0000-0x00000000060D2000-memory.dmp
        Filesize

        8KB

      • memory/1812-12-0x0000000000000000-mapping.dmp
      • memory/1812-14-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp
        Filesize

        8KB