Resubmissions

15-07-2022 09:27

220715-le15caace4 1

15-07-2022 09:08

220715-k3z2hsabg6 10

15-07-2022 09:05

220715-k1622sabf4 1

Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-07-2022 09:08

General

  • Target

    7c04f20104e661f361144cb549006e3fd7d3f960d0c410627bad2a795401a5f6.html

  • Size

    1.1MB

  • MD5

    6033e14dfeb0699ee4c1bd6b9c5ea95f

  • SHA1

    a5e5776da0391a064cbe823822956c0137cef76a

  • SHA256

    7c04f20104e661f361144cb549006e3fd7d3f960d0c410627bad2a795401a5f6

  • SHA512

    b2a5f6543eb830b675cdad7041d5529634ccdcf6ce8de89d98cd7cddb8adaeec56d6f9104d92808d276f2e86e7015a2918fecd8e28b41c5913e511637f264c6d

Malware Config

Extracted

Family

qakbot

Version

403.780

Botnet

obama201

Campaign

1657815129

C2

70.46.220.114:443

179.111.8.52:32101

208.107.221.224:443

176.45.218.138:995

24.158.23.166:995

24.54.48.11:443

89.101.97.139:443

24.55.67.176:443

24.139.72.117:443

120.150.218.241:995

174.69.215.101:443

38.70.253.226:2222

41.228.22.180:443

217.165.157.202:995

172.115.177.204:2222

173.21.10.71:2222

69.14.172.24:443

47.23.89.60:993

104.34.212.7:32103

66.230.104.103:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c04f20104e661f361144cb549006e3fd7d3f960d0c410627bad2a795401a5f6.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1216
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x520
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1912
  • C:\Windows\System32\isoburn.exe
    "C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_Report Jul 14 56956.zip\3590\Report Jul 14 56956.iso"
    1⤵
      PID:632
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap25574:100:7zEvent16137
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1484
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\3590\Report Jul 14 56956.iso"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1900
    • C:\Users\Admin\Downloads\3590\calc.exe
      "C:\Users\Admin\Downloads\3590\calc.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\SysWOW64\regsvr32.exe 7533.dll
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 09:12 /tn feukbyvj /ET 09:23 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEQAbwB3AG4AbABvAGEAZABzAFwAMwA1ADkAMABcADcANQAzADMALgBkAGwAbAAiAA==" /SC ONCE
            4⤵
            • Creates scheduled task(s)
            PID:1432
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /q /c calc.exe
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Users\Admin\Downloads\3590\calc.exe
        calc.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\SysWOW64\regsvr32.exe 7533.dll
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
              PID:1508

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        7dbbd995b16f480e4be1e87e3771e09b

        SHA1

        0435ac12ca5a16e3f94f534a69e0c91480c0fbfc

        SHA256

        98be854f24b0713e72fccc0c3e040adcbe7aff841912b07e0d4d768e2e2bec5d

        SHA512

        88f10823d511f1bd0d70ea6cf5eb22c55cc857fab4cfb2189f0189f4692770424ed65750e6d64619dc4d280c0bd21ed72fa6227ba7dc5d3504b7a2cdf182a044

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9Z12H51O.txt
        Filesize

        602B

        MD5

        25f9c9c3ebf398905f77bd37c94be085

        SHA1

        69f1d682ab457153068580e603e35022e4b1e2f2

        SHA256

        9c7678e3c4f813810337f2e1a8dbdf82c06e4be2c82b8d97e8d99a4a7bebbabb

        SHA512

        560970c8033bd242004e137876b85be46d92c6936a4c9efa55a87332421162dfee1d9227fa1d2555a334068250c74f2017098db8d1c68430398c4dd8ad8eaf60

      • C:\Users\Admin\Downloads\3590\7533.dll
        Filesize

        663KB

        MD5

        813f8790abac50bd495c21b679a5d54f

        SHA1

        21739063a633c8c81a9ac04d3f8d48e11e536038

        SHA256

        0ea61f67684730bdd6c5ddeb74c32d2622f54006b7a3ad5cb9c45dac15513eed

        SHA512

        165837bed0344ff6c2087ab056df448c3a9a6a0c28008060b7b016b9781b708fd7ed12b7070ea4da88bd32474862b3e8d565395a10e7aba00d78c9a4e9bda4b4

      • C:\Users\Admin\Downloads\3590\7533.dll
        Filesize

        663KB

        MD5

        813f8790abac50bd495c21b679a5d54f

        SHA1

        21739063a633c8c81a9ac04d3f8d48e11e536038

        SHA256

        0ea61f67684730bdd6c5ddeb74c32d2622f54006b7a3ad5cb9c45dac15513eed

        SHA512

        165837bed0344ff6c2087ab056df448c3a9a6a0c28008060b7b016b9781b708fd7ed12b7070ea4da88bd32474862b3e8d565395a10e7aba00d78c9a4e9bda4b4

      • C:\Users\Admin\Downloads\3590\7533.dll
        Filesize

        4KB

        MD5

        4d96e94cbcec0f5bb25eeee602fb31c2

        SHA1

        ceb24d9734a74e2da49bb707441a8a3aad4d1cb3

        SHA256

        191362b4ad86e308a893e04e3a6be46a262159de4a8835853f3e256c503feaec

        SHA512

        cefbc7682eee0080828e2ef8a62c65cb78fa493471a786811114086efe2dc3b7c7910b9f8a4948a3768adc975d242ec0f6faf066226ec11e811404c1d5693a0d

      • C:\Users\Admin\Downloads\3590\Report Jul 14 56956.iso
        Filesize

        2.6MB

        MD5

        dd57dd9f92379afff3a44df0e1764825

        SHA1

        8e4690c45c391b6a93db0584f164318ce7bd17e2

        SHA256

        3973fbe964aed7a74d5b2c13f54e876e0e7ec7ff9a5188753c6f9ae3bc0ef2c5

        SHA512

        985f18b7c394989925b96ca6ddb489ba491ded17ad31552befe24451281ba1e5f08853c1be5113b4c0fb7a16da37261f2abb5f613a7c5ed9a8c2f8d9dcb88645

      • C:\Users\Admin\Downloads\3590\WindowsCodecs.dll
        Filesize

        4KB

        MD5

        21930abbbb06588edf0240cc60302143

        SHA1

        48bf9b838ecb90b8389a0c50b301acc32b44b53e

        SHA256

        8760c4b4cc8fdcd144651d5ba02195d238950d3b70abd7d7e1e2d42b6bda9751

        SHA512

        36b092e22b953a4c984530ee1f3d01aae88084ed8146918316438ee37daefe76ed3cb6dfa39c7a020871a92fc2df0a22b5f4146cdd6437339fe3cff4792db4f6

      • C:\Users\Admin\Downloads\3590\calc.exe
        Filesize

        758KB

        MD5

        60b7c0fead45f2066e5b805a91f4f0fc

        SHA1

        9018a7d6cdbe859a430e8794e73381f77c840be0

        SHA256

        80c10ee5f21f92f89cbc293a59d2fd4c01c7958aacad15642558db700943fa22

        SHA512

        68b9f9c00fc64df946684ce81a72a2624f0fc07e07c0c8b3db2fae8c9c0415bd1b4a03ad7ffa96985af0cc5e0410f6c5e29a30200efff21ab4b01369a3c59b58

      • C:\Users\Admin\Downloads\3590\calc.exe
        Filesize

        758KB

        MD5

        60b7c0fead45f2066e5b805a91f4f0fc

        SHA1

        9018a7d6cdbe859a430e8794e73381f77c840be0

        SHA256

        80c10ee5f21f92f89cbc293a59d2fd4c01c7958aacad15642558db700943fa22

        SHA512

        68b9f9c00fc64df946684ce81a72a2624f0fc07e07c0c8b3db2fae8c9c0415bd1b4a03ad7ffa96985af0cc5e0410f6c5e29a30200efff21ab4b01369a3c59b58

      • C:\Users\Admin\Downloads\Report Jul 14 56956.zip.hp6k9do.partial
        Filesize

        696KB

        MD5

        24d11d69dd2e86ebc0856c346082527a

        SHA1

        ccf6e1ca31866627de38fe1e2d42517e03d54e80

        SHA256

        c7728e2e03c96a8d96d4637bc7eebad73b38d5abc87f6032f76ac2b6b7b7e22f

        SHA512

        0278aa51926810fcaa443e1ef1c2fb2d9a1477e963809861e8cf8ec80215c669c113ad81b1e1699ecf8231b02abd43e2d0db2bcebaed3048293cd39beabf07da

      • \Users\Admin\Downloads\3590\7533.dll
        Filesize

        663KB

        MD5

        813f8790abac50bd495c21b679a5d54f

        SHA1

        21739063a633c8c81a9ac04d3f8d48e11e536038

        SHA256

        0ea61f67684730bdd6c5ddeb74c32d2622f54006b7a3ad5cb9c45dac15513eed

        SHA512

        165837bed0344ff6c2087ab056df448c3a9a6a0c28008060b7b016b9781b708fd7ed12b7070ea4da88bd32474862b3e8d565395a10e7aba00d78c9a4e9bda4b4

      • \Users\Admin\Downloads\3590\7533.dll
        Filesize

        663KB

        MD5

        813f8790abac50bd495c21b679a5d54f

        SHA1

        21739063a633c8c81a9ac04d3f8d48e11e536038

        SHA256

        0ea61f67684730bdd6c5ddeb74c32d2622f54006b7a3ad5cb9c45dac15513eed

        SHA512

        165837bed0344ff6c2087ab056df448c3a9a6a0c28008060b7b016b9781b708fd7ed12b7070ea4da88bd32474862b3e8d565395a10e7aba00d78c9a4e9bda4b4

      • \Users\Admin\Downloads\3590\WindowsCodecs.dll
        Filesize

        4KB

        MD5

        21930abbbb06588edf0240cc60302143

        SHA1

        48bf9b838ecb90b8389a0c50b301acc32b44b53e

        SHA256

        8760c4b4cc8fdcd144651d5ba02195d238950d3b70abd7d7e1e2d42b6bda9751

        SHA512

        36b092e22b953a4c984530ee1f3d01aae88084ed8146918316438ee37daefe76ed3cb6dfa39c7a020871a92fc2df0a22b5f4146cdd6437339fe3cff4792db4f6

      • \Users\Admin\Downloads\3590\WindowsCodecs.dll
        Filesize

        4KB

        MD5

        21930abbbb06588edf0240cc60302143

        SHA1

        48bf9b838ecb90b8389a0c50b301acc32b44b53e

        SHA256

        8760c4b4cc8fdcd144651d5ba02195d238950d3b70abd7d7e1e2d42b6bda9751

        SHA512

        36b092e22b953a4c984530ee1f3d01aae88084ed8146918316438ee37daefe76ed3cb6dfa39c7a020871a92fc2df0a22b5f4146cdd6437339fe3cff4792db4f6

      • memory/632-55-0x000007FEFBE61000-0x000007FEFBE63000-memory.dmp
        Filesize

        8KB

      • memory/1156-73-0x0000000000230000-0x00000000002B0000-memory.dmp
        Filesize

        512KB

      • memory/1156-72-0x00000000002E0000-0x0000000000302000-memory.dmp
        Filesize

        136KB

      • memory/1156-74-0x00000000002E0000-0x0000000000302000-memory.dmp
        Filesize

        136KB

      • memory/1156-71-0x00000000002E0000-0x0000000000302000-memory.dmp
        Filesize

        136KB

      • memory/1156-70-0x00000000002E0000-0x0000000000302000-memory.dmp
        Filesize

        136KB

      • memory/1156-92-0x00000000002E0000-0x0000000000302000-memory.dmp
        Filesize

        136KB

      • memory/1156-69-0x0000000001ED0000-0x0000000001F7C000-memory.dmp
        Filesize

        688KB

      • memory/1156-86-0x0000000000230000-0x00000000002B0000-memory.dmp
        Filesize

        512KB

      • memory/1156-65-0x0000000000000000-mapping.dmp
      • memory/1204-89-0x0000000000000000-mapping.dmp
      • memory/1204-91-0x00000000717A1000-0x00000000717A3000-memory.dmp
        Filesize

        8KB

      • memory/1204-93-0x0000000000080000-0x00000000000A2000-memory.dmp
        Filesize

        136KB

      • memory/1432-102-0x0000000000000000-mapping.dmp
      • memory/1508-100-0x00000000000C0000-0x00000000000E2000-memory.dmp
        Filesize

        136KB

      • memory/1508-97-0x00000000000C0000-0x00000000000E2000-memory.dmp
        Filesize

        136KB

      • memory/1508-94-0x0000000000000000-mapping.dmp
      • memory/1776-75-0x0000000000000000-mapping.dmp
      • memory/1792-79-0x0000000000000000-mapping.dmp
      • memory/1792-82-0x0000000001EC0000-0x0000000001F6C000-memory.dmp
        Filesize

        688KB

      • memory/1792-88-0x0000000000230000-0x0000000000252000-memory.dmp
        Filesize

        136KB

      • memory/1792-98-0x0000000000230000-0x0000000000252000-memory.dmp
        Filesize

        136KB

      • memory/1792-87-0x0000000000190000-0x00000000001B9000-memory.dmp
        Filesize

        164KB

      • memory/1792-84-0x0000000000230000-0x0000000000252000-memory.dmp
        Filesize

        136KB

      • memory/1792-83-0x0000000000230000-0x0000000000252000-memory.dmp
        Filesize

        136KB

      • memory/1792-85-0x0000000000230000-0x0000000000252000-memory.dmp
        Filesize

        136KB

      • memory/1916-62-0x0000000075CD1000-0x0000000075CD3000-memory.dmp
        Filesize

        8KB