Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-04-2021 14:19

General

  • Target

    documents-1472621861.xlsb

  • Size

    94KB

  • MD5

    7046115d4093bb8a33ae64df0a85c4dd

  • SHA1

    602a43d4665ea83f3e1d0f1bc27ce83f515e6360

  • SHA256

    e443c61de95ddab96eb2f2658ace7b6d9b03dc3b9b37068396ecd655eb543aec

  • SHA512

    99c0183e937ab6a272fc4fda56eb4eac1e845d1f99a994290e3b380974e973be340b972d5d5186377f5448d949133b7e00790dbd05869b56bd2916c111dc1ef5

Malware Config

Extracted

Family

qakbot

Botnet

tr

Campaign

1618398298

C2

47.196.192.184:443

216.201.162.158:443

136.232.34.70:443

71.41.184.10:3389

140.82.49.12:443

45.63.107.192:2222

45.63.107.192:443

149.28.98.196:443

45.32.211.207:443

144.202.38.185:443

45.77.115.208:2222

45.77.115.208:8443

207.246.116.237:995

45.77.117.108:443

149.28.99.97:443

149.28.99.97:995

149.28.98.196:995

45.32.211.207:995

45.32.211.207:2222

149.28.98.196:2222

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\documents-1472621861.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\wiroe.oer1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3880
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\wiroe.oer2,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3852
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\wiroe.oer3,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4040
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\wiroe.oer4,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 ..\wiroe.oer4,DllRegisterServer
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1836
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn qhgyhxg /tr "regsvr32.exe -s \"C:\Users\Admin\wiroe.oer4\"" /SC ONCE /Z /ST 16:18 /ET 16:30
            5⤵
            • Creates scheduled task(s)
            PID:4348
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\wiroe.oer5,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4372
  • \??\c:\windows\system32\regsvr32.exe
    regsvr32.exe -s "C:\Users\Admin\wiroe.oer4"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Windows\SysWOW64\regsvr32.exe
      -s "C:\Users\Admin\wiroe.oer4"
      2⤵
      • Loads dropped DLL
      PID:4592
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 180
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1836-192-0x0000000000570000-0x00000000005A9000-memory.dmp

    Filesize

    228KB

  • memory/4032-187-0x0000000004E50000-0x0000000004E92000-memory.dmp

    Filesize

    264KB

  • memory/4032-188-0x0000000004EE0000-0x0000000004F19000-memory.dmp

    Filesize

    228KB

  • memory/4032-186-0x0000000004A30000-0x0000000004A31000-memory.dmp

    Filesize

    4KB

  • memory/4656-118-0x00007FFA38500000-0x00007FFA38510000-memory.dmp

    Filesize

    64KB

  • memory/4656-117-0x00007FFA38500000-0x00007FFA38510000-memory.dmp

    Filesize

    64KB

  • memory/4656-121-0x00007FFA38500000-0x00007FFA38510000-memory.dmp

    Filesize

    64KB

  • memory/4656-123-0x000001CDAF030000-0x000001CDB0F25000-memory.dmp

    Filesize

    31.0MB

  • memory/4656-114-0x00007FF79B800000-0x00007FF79EDB6000-memory.dmp

    Filesize

    53.7MB

  • memory/4656-122-0x00007FFA589E0000-0x00007FFA59ACE000-memory.dmp

    Filesize

    16.9MB

  • memory/4656-116-0x00007FFA38500000-0x00007FFA38510000-memory.dmp

    Filesize

    64KB

  • memory/4656-115-0x00007FFA38500000-0x00007FFA38510000-memory.dmp

    Filesize

    64KB