Analysis

  • max time kernel
    140s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-02-2021 09:16

General

  • Target

    CompensationClaim-2000459547-02022021.xls

  • Size

    67KB

  • MD5

    cb555300cee97b3250f5ca1650197f7b

  • SHA1

    702beedaaef076fa9f8fd6510493925f090fe4a1

  • SHA256

    aed3b7b54243021aa6b20fda0ea7bb46a2065a1371202b3bab86482fa3f5bd46

  • SHA512

    a57dfeb94bf437df67bf7b13137aebe08b0ba1c04f3bf94cf98105c34683e96e6986495c157f83ff9cc93332680b1f280d9aa72c6f5d1196f5c7606dd4755ddf

Malware Config

Extracted

Family

qakbot

Botnet

abc123

Campaign

1612349986

C2

222.154.253.111:995

50.244.112.106:443

83.110.108.181:2222

105.198.236.99:443

74.77.162.33:443

106.250.150.98:443

196.151.252.84:443

45.118.216.157:443

140.82.49.12:443

80.11.173.82:8443

71.88.193.17:443

68.186.192.69:443

46.153.119.255:995

81.214.126.173:2222

108.31.15.10:995

197.45.110.165:995

81.88.254.62:443

86.97.8.249:443

202.187.58.21:443

41.39.134.183:443

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\CompensationClaim-2000459547-02022021.xls
    1⤵
    • Deletes itself
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\HYGFR.HYGF,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:304
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\HYGFR.HYGF1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn hwtengerhc /tr "regsvr32.exe -s \"C:\Users\Admin\HYGFR.HYGF1\"" /SC ONCE /Z /ST 09:15 /ET 09:27
          4⤵
          • Creates scheduled task(s)
          PID:776
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\HYGFR.HYGF2,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:344
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\HYGFR.HYGF3,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:644
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\HYGFR.HYGF4,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
          PID:1996
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {24C46644-A97A-4823-8E03-F83F59E6358C} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\system32\regsvr32.exe
        regsvr32.exe -s "C:\Users\Admin\HYGFR.HYGF1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Windows\SysWOW64\regsvr32.exe
          -s "C:\Users\Admin\HYGFR.HYGF1"
          3⤵
          • Loads dropped DLL
          PID:1576

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\HYGFR.HYGF1
      MD5

      67ffd1306ef7070a92aa648a45a09756

      SHA1

      ca57c4b3486430ed50cd11666492f077c9d11a11

      SHA256

      d3501e9f6f190ee55e0cee711aedbf2b2b7cc325177d0fccddfe09ee83abbc28

      SHA512

      4e494ae48dbd9fc03dcaf95b6321b53781468fc48ef12231998e922adcc30294eddfebf8f32833affc141c7acb1bea677eb8787e1991a985d073880acf803769

    • C:\Users\Admin\HYGFR.HYGF1
      MD5

      388e0595f0bd2f250b0b1526e7a9e4e2

      SHA1

      db3b5784319d41285fd13645d276e4be4190e2b2

      SHA256

      fd1dfc13e78f42fd7a7f0a44390295a5c8367f4e7a8fa25e8f68541e12300a5c

      SHA512

      b140a30725eb2d100220710f292a5018ffe83338ea72b147ac3bdc85c440a6742865168b794a5092877641c75f6546ac0ecbf0a7723f0dd7faa4bcdc0c149484

    • C:\Users\Admin\HYGFR.HYGF4
      MD5

      67ffd1306ef7070a92aa648a45a09756

      SHA1

      ca57c4b3486430ed50cd11666492f077c9d11a11

      SHA256

      d3501e9f6f190ee55e0cee711aedbf2b2b7cc325177d0fccddfe09ee83abbc28

      SHA512

      4e494ae48dbd9fc03dcaf95b6321b53781468fc48ef12231998e922adcc30294eddfebf8f32833affc141c7acb1bea677eb8787e1991a985d073880acf803769

    • \Users\Admin\HYGFR.HYGF1
      MD5

      67ffd1306ef7070a92aa648a45a09756

      SHA1

      ca57c4b3486430ed50cd11666492f077c9d11a11

      SHA256

      d3501e9f6f190ee55e0cee711aedbf2b2b7cc325177d0fccddfe09ee83abbc28

      SHA512

      4e494ae48dbd9fc03dcaf95b6321b53781468fc48ef12231998e922adcc30294eddfebf8f32833affc141c7acb1bea677eb8787e1991a985d073880acf803769

    • \Users\Admin\HYGFR.HYGF1
      MD5

      388e0595f0bd2f250b0b1526e7a9e4e2

      SHA1

      db3b5784319d41285fd13645d276e4be4190e2b2

      SHA256

      fd1dfc13e78f42fd7a7f0a44390295a5c8367f4e7a8fa25e8f68541e12300a5c

      SHA512

      b140a30725eb2d100220710f292a5018ffe83338ea72b147ac3bdc85c440a6742865168b794a5092877641c75f6546ac0ecbf0a7723f0dd7faa4bcdc0c149484

    • \Users\Admin\HYGFR.HYGF4
      MD5

      67ffd1306ef7070a92aa648a45a09756

      SHA1

      ca57c4b3486430ed50cd11666492f077c9d11a11

      SHA256

      d3501e9f6f190ee55e0cee711aedbf2b2b7cc325177d0fccddfe09ee83abbc28

      SHA512

      4e494ae48dbd9fc03dcaf95b6321b53781468fc48ef12231998e922adcc30294eddfebf8f32833affc141c7acb1bea677eb8787e1991a985d073880acf803769

    • memory/304-6-0x0000000000000000-mapping.dmp
    • memory/304-7-0x00000000756C1000-0x00000000756C3000-memory.dmp
      Filesize

      8KB

    • memory/344-19-0x0000000000000000-mapping.dmp
    • memory/644-21-0x0000000000000000-mapping.dmp
    • memory/776-41-0x0000000000000000-mapping.dmp
    • memory/776-29-0x0000000000000000-mapping.dmp
    • memory/776-42-0x000007FEFBE81000-0x000007FEFBE83000-memory.dmp
      Filesize

      8KB

    • memory/792-30-0x0000000000080000-0x00000000000B5000-memory.dmp
      Filesize

      212KB

    • memory/792-27-0x0000000000080000-0x00000000000B5000-memory.dmp
      Filesize

      212KB

    • memory/792-15-0x0000000000000000-mapping.dmp
    • memory/792-17-0x000000006C8A1000-0x000000006C8A3000-memory.dmp
      Filesize

      8KB

    • memory/832-12-0x0000000000120000-0x0000000000121000-memory.dmp
      Filesize

      4KB

    • memory/832-13-0x0000000000250000-0x0000000000297000-memory.dmp
      Filesize

      284KB

    • memory/832-18-0x0000000000A00000-0x0000000000A35000-memory.dmp
      Filesize

      212KB

    • memory/832-8-0x0000000000000000-mapping.dmp
    • memory/832-14-0x0000000000A00000-0x0000000000A35000-memory.dmp
      Filesize

      212KB

    • memory/1068-40-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1068-39-0x0000000001E40000-0x0000000001E41000-memory.dmp
      Filesize

      4KB

    • memory/1068-3-0x0000000071681000-0x0000000071683000-memory.dmp
      Filesize

      8KB

    • memory/1068-2-0x000000002F851000-0x000000002F854000-memory.dmp
      Filesize

      12KB

    • memory/1068-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1068-38-0x0000000005C30000-0x0000000005C31000-memory.dmp
      Filesize

      4KB

    • memory/1576-44-0x0000000000000000-mapping.dmp
    • memory/1680-36-0x0000000001DF0000-0x0000000001E25000-memory.dmp
      Filesize

      212KB

    • memory/1680-23-0x0000000000000000-mapping.dmp
    • memory/1680-28-0x0000000000170000-0x0000000000171000-memory.dmp
      Filesize

      4KB

    • memory/1680-32-0x0000000001DF0000-0x0000000001E25000-memory.dmp
      Filesize

      212KB

    • memory/1984-5-0x000007FEF77D0000-0x000007FEF7A4A000-memory.dmp
      Filesize

      2.5MB

    • memory/1996-37-0x00000000000D0000-0x0000000000105000-memory.dmp
      Filesize

      212KB

    • memory/1996-33-0x0000000000000000-mapping.dmp