Analysis

  • max time kernel
    136s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    05-02-2022 11:49

General

  • Target

    a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe

  • Size

    2.3MB

  • MD5

    ab979bad22978286f693fa6d89733b59

  • SHA1

    f65c54320e98a65c850ee1cbd29ff26f1b6f0f43

  • SHA256

    a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e

  • SHA512

    8e480e83a920ef62fdfc93cea622c93ee4ca1134e6ddfcfccf08b126fcdbe1dcb36ec5863e7126d0d5babafd9ffa08b2abcf5afbb2753e0ad7be7d8d9a7003d8

Malware Config

Extracted

Family

qakbot

Version

324.127

Botnet

spx101

Campaign

1587470509

C2

98.213.28.175:443

89.38.74.46:443

75.81.25.223:995

72.16.57.99:443

173.3.132.17:995

24.229.245.124:995

67.165.206.193:995

66.25.168.167:2222

68.39.177.147:995

100.38.123.22:443

66.44.96.184:443

75.110.93.212:443

110.142.205.182:443

72.16.212.107:465

67.251.155.12:443

100.40.48.96:443

24.55.152.50:995

65.131.79.162:995

181.126.86.223:443

73.169.47.57:443

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • CryptOne packer 6 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Executes dropped EXE 2 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe
    "C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe
      C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe /C
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1260
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn dehmioafhn /tr "\"C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe\" /I dehmioafhn" /SC ONCE /Z /ST 11:51 /ET 12:03
      2⤵
      • Creates scheduled task(s)
      PID:1552
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {71328549-478F-45DB-891E-1D509E8D229F} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe
      C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe /I dehmioafhn
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Windows\system32\reg.exe
        C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
        3⤵
          PID:1188
        • C:\Windows\system32\reg.exe
          C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
          3⤵
            PID:1828
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
            3⤵
              PID:1512
            • C:\Windows\system32\reg.exe
              C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
              3⤵
                PID:624
              • C:\Windows\system32\reg.exe
                C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
                3⤵
                  PID:1612
                • C:\Windows\system32\reg.exe
                  C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
                  3⤵
                    PID:1632
                  • C:\Windows\system32\reg.exe
                    C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"
                    3⤵
                      PID:1784
                    • C:\Windows\system32\reg.exe
                      C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"
                      3⤵
                        PID:1496
                      • C:\Windows\system32\reg.exe
                        C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz" /d "0"
                        3⤵
                          PID:968
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                          C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                          3⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          PID:1528
                          • C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                            C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe /C
                            4⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1656
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            4⤵
                            • Adds Run key to start application
                            • Suspicious behavior: EnumeratesProcesses
                            PID:952
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e.exe"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1768
                          • C:\Windows\system32\PING.EXE
                            ping.exe -n 6 127.0.0.1
                            4⤵
                            • Runs ping.exe
                            PID:1148
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /DELETE /F /TN dehmioafhn
                          3⤵
                            PID:1948

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Execution

                      Scheduled Task

                      1
                      T1053

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Scheduled Task

                      1
                      T1053

                      Privilege Escalation

                      Scheduled Task

                      1
                      T1053

                      Defense Evasion

                      Disabling Security Tools

                      2
                      T1089

                      Modify Registry

                      3
                      T1112

                      Discovery

                      System Information Discovery

                      1
                      T1082

                      Remote System Discovery

                      1
                      T1018

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.dat
                        MD5

                        0688058ff703f63c46965215f59d6bf9

                        SHA1

                        4ef5a2f97f09b2907935b1e19ab497a40031ae53

                        SHA256

                        a18797958e100c6781147796876d2bced12ce9f6045b2d628fcfa27d1f67637c

                        SHA512

                        5417e7ce622be22fddac1f7fe7f0bdb0d9545de97a4a275014d0fdf1da297605b13700f62b692daa20352048e05b2cdcff1796b6aca34f564e0f525389d13501

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                        MD5

                        ab979bad22978286f693fa6d89733b59

                        SHA1

                        f65c54320e98a65c850ee1cbd29ff26f1b6f0f43

                        SHA256

                        a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e

                        SHA512

                        8e480e83a920ef62fdfc93cea622c93ee4ca1134e6ddfcfccf08b126fcdbe1dcb36ec5863e7126d0d5babafd9ffa08b2abcf5afbb2753e0ad7be7d8d9a7003d8

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                        MD5

                        ab979bad22978286f693fa6d89733b59

                        SHA1

                        f65c54320e98a65c850ee1cbd29ff26f1b6f0f43

                        SHA256

                        a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e

                        SHA512

                        8e480e83a920ef62fdfc93cea622c93ee4ca1134e6ddfcfccf08b126fcdbe1dcb36ec5863e7126d0d5babafd9ffa08b2abcf5afbb2753e0ad7be7d8d9a7003d8

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                        MD5

                        ab979bad22978286f693fa6d89733b59

                        SHA1

                        f65c54320e98a65c850ee1cbd29ff26f1b6f0f43

                        SHA256

                        a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e

                        SHA512

                        8e480e83a920ef62fdfc93cea622c93ee4ca1134e6ddfcfccf08b126fcdbe1dcb36ec5863e7126d0d5babafd9ffa08b2abcf5afbb2753e0ad7be7d8d9a7003d8

                      • \Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                        MD5

                        ab979bad22978286f693fa6d89733b59

                        SHA1

                        f65c54320e98a65c850ee1cbd29ff26f1b6f0f43

                        SHA256

                        a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e

                        SHA512

                        8e480e83a920ef62fdfc93cea622c93ee4ca1134e6ddfcfccf08b126fcdbe1dcb36ec5863e7126d0d5babafd9ffa08b2abcf5afbb2753e0ad7be7d8d9a7003d8

                      • \Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                        MD5

                        ab979bad22978286f693fa6d89733b59

                        SHA1

                        f65c54320e98a65c850ee1cbd29ff26f1b6f0f43

                        SHA256

                        a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e

                        SHA512

                        8e480e83a920ef62fdfc93cea622c93ee4ca1134e6ddfcfccf08b126fcdbe1dcb36ec5863e7126d0d5babafd9ffa08b2abcf5afbb2753e0ad7be7d8d9a7003d8

                      • \Users\Admin\AppData\Roaming\Microsoft\Rioearzz\vnourn.exe
                        MD5

                        ab979bad22978286f693fa6d89733b59

                        SHA1

                        f65c54320e98a65c850ee1cbd29ff26f1b6f0f43

                        SHA256

                        a69fdd9e4c3558d323c3ddab6c89328ead207046764019014e013dc696d5861e

                        SHA512

                        8e480e83a920ef62fdfc93cea622c93ee4ca1134e6ddfcfccf08b126fcdbe1dcb36ec5863e7126d0d5babafd9ffa08b2abcf5afbb2753e0ad7be7d8d9a7003d8

                      • memory/696-64-0x0000000000400000-0x0000000000646000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/952-72-0x00000000744A1000-0x00000000744A3000-memory.dmp
                        Filesize

                        8KB

                      • memory/952-74-0x0000000000080000-0x00000000000BC000-memory.dmp
                        Filesize

                        240KB

                      • memory/952-75-0x00000000002A0000-0x00000000002D4000-memory.dmp
                        Filesize

                        208KB

                      • memory/1260-57-0x0000000000400000-0x0000000000646000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/1300-54-0x0000000075471000-0x0000000075473000-memory.dmp
                        Filesize

                        8KB

                      • memory/1300-58-0x0000000000400000-0x0000000000646000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/1300-56-0x0000000000300000-0x0000000000339000-memory.dmp
                        Filesize

                        228KB

                      • memory/1528-67-0x0000000000400000-0x0000000000646000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/1656-70-0x0000000000400000-0x0000000000646000-memory.dmp
                        Filesize

                        2.3MB