Resubmissions

28-09-2021 20:53

210928-zpkf8sdbem 10

28-09-2021 15:35

210928-s1h9zscdbp 10

Analysis

  • max time kernel
    587s
  • max time network
    597s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    28-09-2021 15:35

General

  • Target

    CompensationClaim-68254946-09282021.xls

  • Size

    137KB

  • MD5

    e0574cf808d9b7150bac6b894baec9f0

  • SHA1

    6603fa83dbb84f3a0d35982a37dbc5250699a64a

  • SHA256

    7fddbdbd20255e29207d6765f7c3d19a235be7e55ca6184a76a74c2175da8bf4

  • SHA512

    9f98689c83358a470dd50f9f74fc80147e025acb2b88b3a4c8d100a07b3c159097e56950eeee7a71c490ff2dea85a7fb92b4f354c7d8f3bedb1fb13854f07bb8

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://101.99.90.160/44467.6499013889.dat

xlm40.dropper

http://188.165.62.4/44467.6499013889.dat

xlm40.dropper

http://84.32.188.42/44467.6499013889.dat

Extracted

Family

qakbot

Version

402.363

Botnet

obama105

Campaign

1632821932

C2

120.151.47.189:443

41.228.22.180:443

39.52.241.3:995

199.27.127.129:443

216.201.162.158:443

136.232.34.70:443

196.217.156.63:995

120.150.218.241:995

95.77.223.148:443

185.250.148.74:443

181.118.183.94:443

105.198.236.99:443

140.82.49.12:443

37.210.152.224:995

89.101.97.139:443

81.241.252.59:2078

27.223.92.142:995

81.250.153.227:2222

73.151.236.31:443

47.22.148.6:443

Extracted

Family

qakbot

Version

402.363

Botnet

notset

Campaign

1632819510

C2

196.217.156.63:995

120.150.218.241:995

95.77.223.148:443

185.250.148.74:443

181.118.183.94:443

105.198.236.99:443

140.82.49.12:443

37.210.152.224:995

89.101.97.139:443

81.241.252.59:2078

27.223.92.142:995

81.250.153.227:2222

73.151.236.31:443

47.22.148.6:443

122.11.220.212:2222

120.151.47.189:443

199.27.127.129:443

216.201.162.158:443

136.232.34.70:443

76.25.142.196:443

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs
  • Downloads MZ/PE file
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 63 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\CompensationClaim-68254946-09282021.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32 -silent ..\Drezd.red
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\Windows\SysWOW64\regsvr32.exe
        -silent ..\Drezd.red
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3788
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1424
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn mwagzodx /tr "regsvr32.exe -s \"C:\Users\Admin\Drezd.red\"" /SC ONCE /Z /ST 15:38 /ET 15:50
            5⤵
            • Creates scheduled task(s)
            PID:1688
          • C:\Windows\SysWOW64\whoami.exe
            whoami /all
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3968
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c set
            5⤵
              PID:756
            • C:\Windows\SysWOW64\arp.exe
              arp -a
              5⤵
                PID:3584
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /all
                5⤵
                • Gathers network information
                PID:3708
              • C:\Windows\SysWOW64\net.exe
                net view /all
                5⤵
                • Discovers systems in the same network
                PID:2292
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP
                5⤵
                  PID:3676
                • C:\Windows\SysWOW64\net.exe
                  net share
                  5⤵
                    PID:2704
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 share
                      6⤵
                        PID:3936
                    • C:\Windows\SysWOW64\route.exe
                      route print
                      5⤵
                        PID:436
                      • C:\Windows\SysWOW64\netstat.exe
                        netstat -nao
                        5⤵
                        • Gathers network information
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1528
                      • C:\Windows\SysWOW64\net.exe
                        net localgroup
                        5⤵
                          PID:2168
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 localgroup
                            6⤵
                              PID:2164
                          • C:\Windows\SysWOW64\regsvr32.exe
                            regsvr32.exe -s "C:\Users\Admin\AppData\Roaming\Microsoft\Uuevtyplk\swrymdusazuoyv.dll"
                            5⤵
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            PID:3536
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              6⤵
                              • Suspicious behavior: MapViewOfSection
                              PID:420
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                7⤵
                                  PID:3916
                      • C:\Windows\SYSTEM32\regsvr32.exe
                        regsvr32 -silent ..\Drezd1.red
                        2⤵
                        • Process spawned unexpected child process
                        • Suspicious use of WriteProcessMemory
                        PID:1196
                        • C:\Windows\SysWOW64\regsvr32.exe
                          -silent ..\Drezd1.red
                          3⤵
                          • Loads dropped DLL
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          PID:1964
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            4⤵
                              PID:1468
                        • C:\Windows\SYSTEM32\regsvr32.exe
                          regsvr32 -silent ..\Drezd2.red
                          2⤵
                          • Process spawned unexpected child process
                          • Suspicious use of WriteProcessMemory
                          PID:3780
                          • C:\Windows\SysWOW64\regsvr32.exe
                            -silent ..\Drezd2.red
                            3⤵
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:2536
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              4⤵
                                PID:756
                        • \??\c:\windows\system32\regsvr32.exe
                          regsvr32.exe -s "C:\Users\Admin\Drezd.red"
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3296
                          • C:\Windows\SysWOW64\regsvr32.exe
                            -s "C:\Users\Admin\Drezd.red"
                            2⤵
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:1608
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              3⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious use of WriteProcessMemory
                              PID:3364
                              • C:\Windows\system32\reg.exe
                                C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Hpevmea" /d "0"
                                4⤵
                                  PID:2168
                                • C:\Windows\system32\reg.exe
                                  C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Uuevtyplk" /d "0"
                                  4⤵
                                    PID:2164
                            • C:\Windows\system32\msiexec.exe
                              C:\Windows\system32\msiexec.exe /V
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2480

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Execution

                            Scheduled Task

                            1
                            T1053

                            Command-Line Interface

                            1
                            T1059

                            Persistence

                            Scheduled Task

                            1
                            T1053

                            Privilege Escalation

                            Scheduled Task

                            1
                            T1053

                            Defense Evasion

                            Disabling Security Tools

                            1
                            T1089

                            Modify Registry

                            1
                            T1112

                            Discovery

                            Query Registry

                            2
                            T1012

                            System Information Discovery

                            3
                            T1082

                            Remote System Discovery

                            1
                            T1018

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Uuevtyplk\swrymdusazuoyv.dll
                              MD5

                              d03e6eac1f6dcf00ecb1fd9c2080ff13

                              SHA1

                              cae499ad31950dff1d1c9817aa026425c320fc33

                              SHA256

                              e93616d580fb6bfb523ccb2bf089963f015dce0c3b8f3523de10c2197590a8b1

                              SHA512

                              a7ee705eae939fde90dce984a31af34895fe35582d378e5631462bf7b8f3acd0d9c19e288257a492a20de8664f6db44268f0d735c6c4e83359554b8215015771

                            • C:\Users\Admin\Drezd.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • C:\Users\Admin\Drezd.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • C:\Users\Admin\Drezd1.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • C:\Users\Admin\Drezd2.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • \??\PIPE\wkssvc
                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • \Users\Admin\AppData\Roaming\Microsoft\Uuevtyplk\swrymdusazuoyv.dll
                              MD5

                              d03e6eac1f6dcf00ecb1fd9c2080ff13

                              SHA1

                              cae499ad31950dff1d1c9817aa026425c320fc33

                              SHA256

                              e93616d580fb6bfb523ccb2bf089963f015dce0c3b8f3523de10c2197590a8b1

                              SHA512

                              a7ee705eae939fde90dce984a31af34895fe35582d378e5631462bf7b8f3acd0d9c19e288257a492a20de8664f6db44268f0d735c6c4e83359554b8215015771

                            • \Users\Admin\Drezd.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • \Users\Admin\Drezd.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • \Users\Admin\Drezd1.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • \Users\Admin\Drezd2.red
                              MD5

                              cab2dca20d849da1b20e6a61bb2d26fb

                              SHA1

                              f87743a59933fb36f029ea50e5e57593a876f726

                              SHA256

                              9be5c4141a62a610ed53125d238ecfd3139a521bfbdde9f8f3c2cd3eab6180e8

                              SHA512

                              cfe0c6f4b27641a73660b68a8a6d1686b7ea450492de23f6a4dd9758f43fe4ee4e8120f4677e59062e7e5400a5c958f6c74175ea3ac83ec5f0abf95585608dee

                            • memory/420-359-0x00000000033B0000-0x00000000033B1000-memory.dmp
                              Filesize

                              4KB

                            • memory/420-357-0x0000000002DD0000-0x0000000002DF1000-memory.dmp
                              Filesize

                              132KB

                            • memory/420-356-0x0000000000000000-mapping.dmp
                            • memory/436-344-0x0000000000000000-mapping.dmp
                            • memory/756-313-0x0000000000150000-0x0000000000171000-memory.dmp
                              Filesize

                              132KB

                            • memory/756-307-0x0000000000000000-mapping.dmp
                            • memory/756-337-0x0000000000000000-mapping.dmp
                            • memory/1196-287-0x0000000000000000-mapping.dmp
                            • memory/1424-293-0x0000000003280000-0x0000000003281000-memory.dmp
                              Filesize

                              4KB

                            • memory/1424-286-0x0000000000000000-mapping.dmp
                            • memory/1424-294-0x0000000002D90000-0x0000000002DB1000-memory.dmp
                              Filesize

                              132KB

                            • memory/1468-298-0x0000000000000000-mapping.dmp
                            • memory/1468-303-0x0000000002D90000-0x0000000002DB1000-memory.dmp
                              Filesize

                              132KB

                            • memory/1528-345-0x0000000000000000-mapping.dmp
                            • memory/1608-318-0x0000000000000000-mapping.dmp
                            • memory/1608-323-0x00000000032C0000-0x000000000340A000-memory.dmp
                              Filesize

                              1.3MB

                            • memory/1608-321-0x00000000733F0000-0x00000000734C2000-memory.dmp
                              Filesize

                              840KB

                            • memory/1688-291-0x0000000000000000-mapping.dmp
                            • memory/1964-296-0x00000000733F0000-0x00000000734C2000-memory.dmp
                              Filesize

                              840KB

                            • memory/1964-295-0x00000000733F0000-0x0000000073411000-memory.dmp
                              Filesize

                              132KB

                            • memory/1964-289-0x0000000000000000-mapping.dmp
                            • memory/1964-297-0x0000000002810000-0x00000000028BE000-memory.dmp
                              Filesize

                              696KB

                            • memory/2164-347-0x0000000000000000-mapping.dmp
                            • memory/2164-332-0x0000000000000000-mapping.dmp
                            • memory/2168-346-0x0000000000000000-mapping.dmp
                            • memory/2168-331-0x0000000000000000-mapping.dmp
                            • memory/2292-340-0x0000000000000000-mapping.dmp
                            • memory/2372-120-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
                              Filesize

                              64KB

                            • memory/2372-118-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
                              Filesize

                              64KB

                            • memory/2372-119-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
                              Filesize

                              64KB

                            • memory/2372-117-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
                              Filesize

                              64KB

                            • memory/2372-123-0x00007FFBAD180000-0x00007FFBAE26E000-memory.dmp
                              Filesize

                              16.9MB

                            • memory/2372-116-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
                              Filesize

                              64KB

                            • memory/2372-115-0x00007FF690A00000-0x00007FF693FB6000-memory.dmp
                              Filesize

                              53.7MB

                            • memory/2372-124-0x00000291BC730000-0x00000291BE625000-memory.dmp
                              Filesize

                              31.0MB

                            • memory/2372-274-0x00000291CC1B0000-0x00000291CC1B4000-memory.dmp
                              Filesize

                              16KB

                            • memory/2536-305-0x00000000733F0000-0x00000000734C2000-memory.dmp
                              Filesize

                              840KB

                            • memory/2536-301-0x0000000000000000-mapping.dmp
                            • memory/2536-306-0x0000000002AF0000-0x0000000002AF1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2704-342-0x0000000000000000-mapping.dmp
                            • memory/3364-335-0x00000000006E0000-0x0000000000701000-memory.dmp
                              Filesize

                              132KB

                            • memory/3364-330-0x0000000000000000-mapping.dmp
                            • memory/3536-354-0x0000000005300000-0x0000000005321000-memory.dmp
                              Filesize

                              132KB

                            • memory/3536-353-0x00000000034E0000-0x00000000034E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/3536-355-0x0000000005350000-0x0000000005371000-memory.dmp
                              Filesize

                              132KB

                            • memory/3536-350-0x0000000000000000-mapping.dmp
                            • memory/3584-338-0x0000000000000000-mapping.dmp
                            • memory/3676-341-0x0000000000000000-mapping.dmp
                            • memory/3708-339-0x0000000000000000-mapping.dmp
                            • memory/3780-299-0x0000000000000000-mapping.dmp
                            • memory/3788-283-0x0000000073FB0000-0x0000000073FD1000-memory.dmp
                              Filesize

                              132KB

                            • memory/3788-285-0x0000000002E40000-0x0000000002EEE000-memory.dmp
                              Filesize

                              696KB

                            • memory/3788-284-0x0000000073FB0000-0x0000000074082000-memory.dmp
                              Filesize

                              840KB

                            • memory/3788-281-0x0000000000000000-mapping.dmp
                            • memory/3916-360-0x0000000000000000-mapping.dmp
                            • memory/3916-362-0x0000000002C90000-0x0000000002D1C000-memory.dmp
                              Filesize

                              560KB

                            • memory/3916-361-0x0000000000370000-0x0000000000391000-memory.dmp
                              Filesize

                              132KB

                            • memory/3936-343-0x0000000000000000-mapping.dmp
                            • memory/3968-336-0x0000000000000000-mapping.dmp
                            • memory/3992-279-0x0000000000000000-mapping.dmp