Analysis

  • max time kernel
    154s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    05-02-2022 08:47

General

  • Target

    e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe

  • Size

    2.0MB

  • MD5

    41a34d0c4bcefdb876e8b0c7906a80bc

  • SHA1

    4db30d988061ee03f419ef2ab27ad79d686d59f3

  • SHA256

    e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464

  • SHA512

    d5179f05d4266584e4e93e7d709e92221d8178b57943e52110c20ff75de984bd27727900a7ecbbc21c7d731d804e32e7e4b4e1b139a1258174f29d2734c4a0cc

Malware Config

Extracted

Family

qakbot

Version

324.127

Botnet

spx107

Campaign

1588082813

C2

97.81.255.189:443

67.8.103.21:443

47.232.26.181:443

50.104.67.101:443

173.172.205.216:443

108.188.46.240:995

96.35.170.82:2222

70.95.94.91:2222

72.204.242.138:6881

72.231.224.122:2222

73.137.187.150:443

73.123.16.215:443

71.213.29.14:995

209.182.121.133:2222

82.210.157.185:443

69.47.26.41:443

86.122.7.89:443

71.187.170.235:443

79.113.46.93:443

74.134.4.236:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Sets service image path in registry 2 TTPs
  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe
    "C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe
      C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe /C
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      PID:2528
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn oplbplcp /tr "\"C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe\" /I oplbplcp" /SC ONCE /Z /ST 09:50 /ET 10:02
      2⤵
      • Creates scheduled task(s)
      PID:2592
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe a47056b8e1ed3553c7af124ed05f2241 VEKkGeTnokKB+WGexLHxbg.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:1200
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:4076
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:112
  • C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe
    C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe /I oplbplcp
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\system32\reg.exe
      C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
      2⤵
        PID:3308
      • C:\Windows\system32\reg.exe
        C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
        2⤵
          PID:2404
        • C:\Windows\system32\reg.exe
          C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
          2⤵
            PID:956
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
            2⤵
              PID:868
            • C:\Windows\system32\reg.exe
              C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
              2⤵
                PID:924
              • C:\Windows\system32\reg.exe
                C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
                2⤵
                  PID:2016
                • C:\Windows\system32\reg.exe
                  C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
                  2⤵
                    PID:3364
                  • C:\Windows\system32\reg.exe
                    C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
                    2⤵
                      PID:2940
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\e4d08e043acee0101260fad44e81a9d2cc514fac6f3b2a92209c5eb59e6f1464.exe"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3488
                      • C:\Windows\system32\PING.EXE
                        ping.exe -n 6 127.0.0.1
                        3⤵
                        • Runs ping.exe
                        PID:3692
                    • C:\Windows\system32\schtasks.exe
                      "C:\Windows\system32\schtasks.exe" /DELETE /F /TN oplbplcp
                      2⤵
                        PID:2564

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Execution

                    Scheduled Task

                    1
                    T1053

                    Persistence

                    Registry Run Keys / Startup Folder

                    1
                    T1060

                    Scheduled Task

                    1
                    T1053

                    Privilege Escalation

                    Scheduled Task

                    1
                    T1053

                    Defense Evasion

                    Disabling Security Tools

                    1
                    T1089

                    Modify Registry

                    2
                    T1112

                    Discovery

                    System Information Discovery

                    3
                    T1082

                    Query Registry

                    2
                    T1012

                    Peripheral Device Discovery

                    1
                    T1120

                    Remote System Discovery

                    1
                    T1018

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/2272-133-0x0000000000400000-0x00000000005FB000-memory.dmp
                      Filesize

                      2.0MB

                    • memory/2528-132-0x0000000000400000-0x00000000005FB000-memory.dmp
                      Filesize

                      2.0MB

                    • memory/3916-130-0x0000000002330000-0x0000000002369000-memory.dmp
                      Filesize

                      228KB

                    • memory/3916-131-0x0000000000400000-0x00000000005FB000-memory.dmp
                      Filesize

                      2.0MB