Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-02-2021 19:35

General

  • Target

    document-1911271790.xls

  • Size

    88KB

  • MD5

    b06088f340daf14e2329423e6c03a3d8

  • SHA1

    16cb3c036658cb410b7ba2af0e5b580791d43271

  • SHA256

    9c60f9e70aacfccb250fe5cce6d0cf8701e5dc08c2aa9ac44db5e95d8f51130a

  • SHA512

    6fb87d80550049a3a2750c8d3e0078d75a30b1e987c0f4d1afc40030fe95242c5146e4206bafd3f8c36be1f6b6cdd257e7dd90690f8f14b7df66e06889da2aee

Malware Config

Extracted

Family

qakbot

Botnet

tr

Campaign

1613385567

C2

78.63.226.32:443

197.51.82.72:443

193.248.221.184:2222

95.77.223.148:443

71.199.192.62:443

77.211.30.202:995

80.227.5.69:443

77.27.204.204:995

81.97.154.100:443

173.184.119.153:995

38.92.225.121:443

81.150.181.168:2222

90.65.236.181:2222

83.110.103.152:443

73.153.211.227:443

188.25.63.105:443

89.137.211.239:995

202.188.138.162:443

98.173.34.212:995

87.202.87.210:2222

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • themida 6 IoCs

    Detects Themida, Advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\document-1911271790.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\idefje.ekfd,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 ..\idefje.ekfd,DllRegisterServer
        3⤵
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4012
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
            PID:3452
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 720
              5⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4032
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
              PID:1136
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 736
                5⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3944
            • C:\Windows\SysWOW64\mobsync.exe
              C:\Windows\SysWOW64\mobsync.exe
              4⤵
                PID:3972
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 464
                  5⤵
                  • Program crash
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1416

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Virtualization/Sandbox Evasion

        1
        T1497

        Discovery

        Query Registry

        5
        T1012

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        5
        T1082

        Peripheral Device Discovery

        1
        T1120

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\idefje.ekfd
          MD5

          b509be029763ac06bb800fc69aa37233

          SHA1

          3eeca996be760557f70776ab61c700fe45a7c22d

          SHA256

          cb3a5f285a6e6682544aec97a87cba31df7f9a03e9ecd5635fe5117782983fb0

          SHA512

          d43444cfb5489d582efebe246da5f75d716cf70c52c4be679b2018acc90461892b99158327733dc16d4202f5bd16b95f2ddc3082fef7c36c966fe9dfb7cd3514

        • \Users\Admin\idefje.ekfd
          MD5

          b509be029763ac06bb800fc69aa37233

          SHA1

          3eeca996be760557f70776ab61c700fe45a7c22d

          SHA256

          cb3a5f285a6e6682544aec97a87cba31df7f9a03e9ecd5635fe5117782983fb0

          SHA512

          d43444cfb5489d582efebe246da5f75d716cf70c52c4be679b2018acc90461892b99158327733dc16d4202f5bd16b95f2ddc3082fef7c36c966fe9dfb7cd3514

        • memory/648-2-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
          Filesize

          64KB

        • memory/648-3-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
          Filesize

          64KB

        • memory/648-4-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
          Filesize

          64KB

        • memory/648-6-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
          Filesize

          64KB

        • memory/648-5-0x00007FF9E73C0000-0x00007FF9E79F7000-memory.dmp
          Filesize

          6.2MB

        • memory/1136-24-0x0000000003090000-0x00000000034B9000-memory.dmp
          Filesize

          4.2MB

        • memory/1136-20-0x0000000000000000-mapping.dmp
        • memory/1416-26-0x0000000004280000-0x0000000004281000-memory.dmp
          Filesize

          4KB

        • memory/2544-7-0x0000000000000000-mapping.dmp
        • memory/3452-18-0x0000000003000000-0x0000000003429000-memory.dmp
          Filesize

          4.2MB

        • memory/3452-14-0x0000000000000000-mapping.dmp
        • memory/3944-21-0x0000000004D30000-0x0000000004D31000-memory.dmp
          Filesize

          4KB

        • memory/3972-25-0x0000000000000000-mapping.dmp
        • memory/3972-27-0x00000000008C0000-0x0000000000CE9000-memory.dmp
          Filesize

          4.2MB

        • memory/4012-13-0x0000000077C34000-0x0000000077C35000-memory.dmp
          Filesize

          4KB

        • memory/4012-12-0x0000000010001000-0x0000000010025000-memory.dmp
          Filesize

          144KB

        • memory/4012-11-0x0000000010000000-0x0000000010429000-memory.dmp
          Filesize

          4.2MB

        • memory/4012-9-0x0000000000000000-mapping.dmp
        • memory/4032-15-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
          Filesize

          4KB

        • memory/4032-16-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
          Filesize

          4KB

        • memory/4032-19-0x0000000004EC0000-0x0000000004EC1000-memory.dmp
          Filesize

          4KB