Analysis

  • max time kernel
    152s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-02-2021 15:33

General

  • Target

    commerce _02.21.doc

  • Size

    95KB

  • MD5

    722794fe9f968337d7e5169e8e27fccf

  • SHA1

    dfa1c56a856f306887ffb98a827bb284a810f81b

  • SHA256

    208db84f6584f0feea7ad5098a17862e1ad87eac413e1c8a9e402f773b1fd615

  • SHA512

    03a3f20759cdcdeda185e07d5cdc9ca8549ecc24214752c12c70b25eb63cbfbb4a328cc25f2bdbb4d38deb022afc5d41c7dfa706238617b51c78b27e8f2e4e3a

Malware Config

Extracted

Family

qakbot

Botnet

krk01

Campaign

1611569149

C2

31.5.21.66:995

89.3.198.238:443

202.188.138.162:443

188.24.128.253:443

175.141.219.71:443

151.60.15.183:443

184.189.122.72:443

80.227.5.70:443

140.82.49.12:443

89.211.241.100:995

81.97.154.100:443

77.27.174.49:995

92.154.83.96:2078

42.3.8.54:443

71.187.170.235:443

46.153.36.53:995

71.182.142.63:443

105.186.102.16:443

50.244.112.106:443

78.63.226.32:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\commerce _02.21.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\programdata\xml.com
      "C:\programdata\xml.com" process list /format : "c:\programdata\i.xsl"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 c:\programdata\27759.jpg
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
            PID:664
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:816

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • C:\programdata\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \??\c:\programdata\27759.jpg
        MD5

        9159385b8c97c71345927b333aeda23e

        SHA1

        a8327bba8d0bedc0423aeb2d57727d7b12f68377

        SHA256

        908054b1ffb1cddae6520a4ad86ddca31d8882f3d4c5a0c3ea2a253e6c55f264

        SHA512

        700fadaa2d1406b2705a8409411bd832df7c56ff195c487c9d83ee16fc9ea60d72cfc4df6dfc81e54ca124e71aefa8931d25fa18cac5b952b8c53aaa36c607e5

      • \??\c:\programdata\i.xsl
        MD5

        87189b779e944d94f1f3e0a8720cfde3

        SHA1

        b8e7bb364f5909ace5447d707e24a1d4757904ec

        SHA256

        be41f4f3b31aae82f634ba1a853ca993900dcd4b13607e1546cbe959ae03b7b7

        SHA512

        c5daffdf9cf3e423dc34bb2ff29cc51341859a8c301d2e694f98f0df8ebd775dfc9bfdc3e5460ff3cde0f93832fcd38dbe2d96e1ec4db4a1556f40868ec1aaf3

      • \ProgramData\27759.jpg
        MD5

        9159385b8c97c71345927b333aeda23e

        SHA1

        a8327bba8d0bedc0423aeb2d57727d7b12f68377

        SHA256

        908054b1ffb1cddae6520a4ad86ddca31d8882f3d4c5a0c3ea2a253e6c55f264

        SHA512

        700fadaa2d1406b2705a8409411bd832df7c56ff195c487c9d83ee16fc9ea60d72cfc4df6dfc81e54ca124e71aefa8931d25fa18cac5b952b8c53aaa36c607e5

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • \ProgramData\xml.com
        MD5

        a03cf3838775e0801a0894c8bacd2e56

        SHA1

        4368dbd172224ec9461364be1ac9dffc5d9224a8

        SHA256

        132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81

        SHA512

        b9e2467157139cc288e027d34865034eaf441dd69981a91df18d60e6b6a7cc53f8102230d18e4c6de2f3ad3ab413d755663bfc82d3033e52faf38509a7cdfcdc

      • memory/520-15-0x000007FEF77C0000-0x000007FEF7A3A000-memory.dmp
        Filesize

        2.5MB

      • memory/664-25-0x000000006A461000-0x000000006A463000-memory.dmp
        Filesize

        8KB

      • memory/664-26-0x00000000000C0000-0x00000000000F5000-memory.dmp
        Filesize

        212KB

      • memory/664-23-0x0000000000000000-mapping.dmp
      • memory/816-13-0x000007FEFB851000-0x000007FEFB853000-memory.dmp
        Filesize

        8KB

      • memory/816-12-0x0000000000000000-mapping.dmp
      • memory/1044-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1044-5-0x00000000062F0000-0x00000000062F2000-memory.dmp
        Filesize

        8KB

      • memory/1044-3-0x000000006FDD1000-0x000000006FDD3000-memory.dmp
        Filesize

        8KB

      • memory/1044-2-0x0000000072351000-0x0000000072354000-memory.dmp
        Filesize

        12KB

      • memory/1156-10-0x0000000000000000-mapping.dmp
      • memory/1968-17-0x0000000000000000-mapping.dmp
      • memory/1968-22-0x0000000000130000-0x0000000000131000-memory.dmp
        Filesize

        4KB

      • memory/1968-21-0x000000006AB40000-0x000000006AB75000-memory.dmp
        Filesize

        212KB

      • memory/1968-18-0x00000000760A1000-0x00000000760A3000-memory.dmp
        Filesize

        8KB

      • memory/1968-27-0x0000000000200000-0x0000000000201000-memory.dmp
        Filesize

        4KB