Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-05-2022 22:06

General

  • Target

    Cancellation-1617961783$-May5.xlsb

  • Size

    65KB

  • MD5

    50b9d40af63502d875146f3534b3fdcd

  • SHA1

    fd9310a452b43d05bb59b141f31dae7ca86a6c60

  • SHA256

    21af29b0997577c1bb039c379e50372ad7df0b1d36a33bc8528489d24abb3858

  • SHA512

    c18a245cfc03328a8af11ed09cf6b51ea99d292fd135cd81d569020fea8f4f2c42599476f6b9e6f8804ce22ea29f2b52d762c83ceb1deaf3730268adc6b38608

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

qakbot

Version

403.683

Botnet

obama182

Campaign

1651756499

C2

103.107.113.120:443

80.11.74.81:2222

177.102.2.175:32101

24.178.196.158:2222

91.177.173.10:995

181.208.248.227:443

176.67.56.94:443

202.134.152.2:2222

148.0.57.85:443

179.179.162.9:993

40.134.246.185:995

37.186.54.254:995

196.203.37.215:80

120.150.218.241:995

208.107.221.224:443

113.53.151.59:443

70.46.220.114:443

69.14.172.24:443

108.60.213.141:443

24.55.67.176:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Windows security bypass 2 TTPs
  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Cancellation-1617961783$-May5.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32 /s calc
      2⤵
      • Process spawned unexpected child process
      PID:4600
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32 C:\Merto\Byrost\Veonse.OOOCCCXXX
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Merto\Byrost\Veonse.OOOCCCXXX
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:116
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn sfmltkkjw /tr "regsvr32.exe -s \"C:\Merto\Byrost\Veonse.OOOCCCXXX\"" /SC ONCE /Z /ST 00:09 /ET 00:21
            5⤵
            • Creates scheduled task(s)
            PID:4588
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32 C:\Merto\Byrost\Veonsea.OOOCCCXXX
      2⤵
      • Process spawned unexpected child process
      PID:1220
    • C:\Windows\SYSTEM32\regsvr32.exe
      regsvr32 C:\Merto\Byrost\Veonseb.OOOCCCXXX
      2⤵
      • Process spawned unexpected child process
      PID:1728
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:1384
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\Merto\Byrost\Veonse.OOOCCCXXX"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\Merto\Byrost\Veonse.OOOCCCXXX"
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          3⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:968
          • C:\Windows\system32\reg.exe
            C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Eyavomjpki" /d "0"
            4⤵
              PID:4160
            • C:\Windows\system32\reg.exe
              C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Tnpofi" /d "0"
              4⤵
                PID:1180

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Disabling Security Tools

        1
        T1089

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        2
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Merto\Byrost\Veonse.OOOCCCXXX
          Filesize

          855KB

          MD5

          b421410d6c08a39d6dd94dd4c6435b23

          SHA1

          e4bc64093485ebd412ce61d7d811c4a234867025

          SHA256

          b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99

          SHA512

          03b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d

        • C:\Merto\Byrost\Veonse.OOOCCCXXX
          Filesize

          855KB

          MD5

          b421410d6c08a39d6dd94dd4c6435b23

          SHA1

          e4bc64093485ebd412ce61d7d811c4a234867025

          SHA256

          b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99

          SHA512

          03b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d

        • C:\Merto\Byrost\Veonse.OOOCCCXXX
          Filesize

          855KB

          MD5

          b421410d6c08a39d6dd94dd4c6435b23

          SHA1

          e4bc64093485ebd412ce61d7d811c4a234867025

          SHA256

          b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99

          SHA512

          03b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d

        • C:\Merto\Byrost\Veonse.OOOCCCXXX
          Filesize

          855KB

          MD5

          b421410d6c08a39d6dd94dd4c6435b23

          SHA1

          e4bc64093485ebd412ce61d7d811c4a234867025

          SHA256

          b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99

          SHA512

          03b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d

        • memory/112-138-0x0000000000000000-mapping.dmp
        • memory/116-142-0x0000000002DE0000-0x0000000002E02000-memory.dmp
          Filesize

          136KB

        • memory/116-143-0x0000000002D90000-0x0000000002DB2000-memory.dmp
          Filesize

          136KB

        • memory/116-140-0x0000000000000000-mapping.dmp
        • memory/116-144-0x0000000002DE0000-0x0000000002E02000-memory.dmp
          Filesize

          136KB

        • memory/968-156-0x0000000000000000-mapping.dmp
        • memory/968-159-0x0000000001240000-0x0000000001262000-memory.dmp
          Filesize

          136KB

        • memory/1180-158-0x0000000000000000-mapping.dmp
        • memory/1220-146-0x0000000000000000-mapping.dmp
        • memory/1332-151-0x0000000000000000-mapping.dmp
        • memory/1332-153-0x0000000001950000-0x0000000001972000-memory.dmp
          Filesize

          136KB

        • memory/1332-155-0x0000000001950000-0x0000000001972000-memory.dmp
          Filesize

          136KB

        • memory/1332-154-0x0000000001900000-0x0000000001922000-memory.dmp
          Filesize

          136KB

        • memory/1572-145-0x0000000000000000-mapping.dmp
        • memory/1572-149-0x0000000001240000-0x0000000001262000-memory.dmp
          Filesize

          136KB

        • memory/1728-147-0x0000000000000000-mapping.dmp
        • memory/4160-157-0x0000000000000000-mapping.dmp
        • memory/4588-148-0x0000000000000000-mapping.dmp
        • memory/4600-137-0x0000000000000000-mapping.dmp
        • memory/4948-134-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmp
          Filesize

          64KB

        • memory/4948-130-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmp
          Filesize

          64KB

        • memory/4948-135-0x00007FFC474A0000-0x00007FFC474B0000-memory.dmp
          Filesize

          64KB

        • memory/4948-133-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmp
          Filesize

          64KB

        • memory/4948-136-0x00007FFC474A0000-0x00007FFC474B0000-memory.dmp
          Filesize

          64KB

        • memory/4948-132-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmp
          Filesize

          64KB

        • memory/4948-131-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmp
          Filesize

          64KB