Analysis

  • max time kernel
    370s
  • max time network
    356s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2022 15:04

General

  • Target

    Report Jul 14 34594.html

  • Size

    1.1MB

  • MD5

    5703b2785b9813aaa7d361c98ca4c0ac

  • SHA1

    b8a2d58bbd98fea5fb6f601b421445032fbe4bb6

  • SHA256

    7565197033c48948b916cfca13a09a414e3370482f208e86b00502a0a7f5a2c4

  • SHA512

    3bd447adc5cd3be31b313d132aead913cc04cd9daa75255fb7b43ad825c25b17604f0fa8cdab2b410f1cd071c059e3e3a651298d77cae6212c5569f3671e3c96

Malware Config

Extracted

Family

qakbot

Version

403.780

Botnet

obama201

Campaign

1657815129

C2

70.46.220.114:443

179.111.8.52:32101

208.107.221.224:443

176.45.218.138:995

24.158.23.166:995

24.54.48.11:443

89.101.97.139:443

24.55.67.176:443

24.139.72.117:443

120.150.218.241:995

174.69.215.101:443

38.70.253.226:2222

41.228.22.180:443

217.165.157.202:995

172.115.177.204:2222

173.21.10.71:2222

69.14.172.24:443

47.23.89.60:993

104.34.212.7:32103

66.230.104.103:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Modifies data under HKEY_USERS 51 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 59 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Report Jul 14 34594.html"
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3980 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3452
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4836
    • C:\Windows\system32\osk.exe
      "C:\Windows\system32\osk.exe"
      1⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:4368
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x498 0x3d8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1568
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\Report Jul 14 34594\3590\" -an -ai#7zMap31012:150:7zEvent27747
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:100
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /q /c calc.exe
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Users\Admin\Documents\Report Jul 14 34594\3590\calc.exe
        calc.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\SysWOW64\regsvr32.exe 7533.dll
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2324
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2288
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:10 /tn ftdggmxsw /ET 17:21 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEQAbwBjAHUAbQBlAG4AdABzAFwAUgBlAHAAbwByAHQAIABKAHUAbAAgADEANAAgADMANAA1ADkANABcADMANQA5ADAAXAA3ADUAMwAzAC4AZABsAGwAIgA=" /SC ONCE
              5⤵
              • Creates scheduled task(s)
              PID:3900
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\Report Jul 14 34594\3590\WindowsCodecs.dll
        2⤵
          PID:4696
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEQAbwBjAHUAbQBlAG4AdABzAFwAUgBlAHAAbwByAHQAIABKAHUAbAAgADEANAAgADMANAA1ADkANABcADMANQA5ADAAXAA3ADUAMwAzAC4AZABsAGwAIgA=
        1⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4796
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" "C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3236
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll"
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              4⤵
              • Modifies data under HKEY_USERS
              PID:3932
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3924
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll
          2⤵
            PID:664

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        2
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0S6OBVY5\Report Jul 14 34594.zip.hwacl6i.partial
          Filesize

          696KB

          MD5

          e450d4fa37ecd8b85d5c56fc7b11a7d8

          SHA1

          806b7bd657fc12685fe56e13b6740e6179e9c083

          SHA256

          5369c33d8843673162fc3a76287163d51cc2aca308ec690f85479caaef4eb0cf

          SHA512

          3dbb800f708b4e69187432a090ea617326862e986c9f8b447862073628736fa8c0cc82bcd9b85dff9ca3b93487640a53761e0431de35ca51b1a2b44a34c95f84

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll
          Filesize

          663KB

          MD5

          ea078c250be209724d951e13b9f10918

          SHA1

          b4de93a381008505dd145b5c22668b256279f0f4

          SHA256

          3e8d61ca0c9ff25fd8cc603a90b639e7ee58502eda75fd54da7accdd9f83a125

          SHA512

          c1aafffa026ee411fb7c54dd52d8a0b88ca850810d70ee7b0e77f89e6e2e266b2e59a0d14318cf6afb9b5375196473d8e4e830136240a8d0a5015592208c21ea

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll
          Filesize

          663KB

          MD5

          ea078c250be209724d951e13b9f10918

          SHA1

          b4de93a381008505dd145b5c22668b256279f0f4

          SHA256

          3e8d61ca0c9ff25fd8cc603a90b639e7ee58502eda75fd54da7accdd9f83a125

          SHA512

          c1aafffa026ee411fb7c54dd52d8a0b88ca850810d70ee7b0e77f89e6e2e266b2e59a0d14318cf6afb9b5375196473d8e4e830136240a8d0a5015592208c21ea

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll
          Filesize

          663KB

          MD5

          ea078c250be209724d951e13b9f10918

          SHA1

          b4de93a381008505dd145b5c22668b256279f0f4

          SHA256

          3e8d61ca0c9ff25fd8cc603a90b639e7ee58502eda75fd54da7accdd9f83a125

          SHA512

          c1aafffa026ee411fb7c54dd52d8a0b88ca850810d70ee7b0e77f89e6e2e266b2e59a0d14318cf6afb9b5375196473d8e4e830136240a8d0a5015592208c21ea

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll
          Filesize

          663KB

          MD5

          ea078c250be209724d951e13b9f10918

          SHA1

          b4de93a381008505dd145b5c22668b256279f0f4

          SHA256

          3e8d61ca0c9ff25fd8cc603a90b639e7ee58502eda75fd54da7accdd9f83a125

          SHA512

          c1aafffa026ee411fb7c54dd52d8a0b88ca850810d70ee7b0e77f89e6e2e266b2e59a0d14318cf6afb9b5375196473d8e4e830136240a8d0a5015592208c21ea

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\7533.dll
          Filesize

          4KB

          MD5

          76a2decc68aff93f026b420515cc3ff4

          SHA1

          6fd671ee5b904e9f32cfaf3efe156aa67d29a6cf

          SHA256

          116fa41add376639d7490471eb01703a49a257e5ed61dad106abb8165355ad7d

          SHA512

          5fc39f653a318e765f54c03c2d6dcceab3a4ec904950e6bca8e6b5a1cabf3c2fe577ff7022bb63df7edfa1c342b6a0a2d68f3a3d7f4ef4c1801e6f6d644778c9

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\WindowsCodecs.dll
          Filesize

          4KB

          MD5

          21930abbbb06588edf0240cc60302143

          SHA1

          48bf9b838ecb90b8389a0c50b301acc32b44b53e

          SHA256

          8760c4b4cc8fdcd144651d5ba02195d238950d3b70abd7d7e1e2d42b6bda9751

          SHA512

          36b092e22b953a4c984530ee1f3d01aae88084ed8146918316438ee37daefe76ed3cb6dfa39c7a020871a92fc2df0a22b5f4146cdd6437339fe3cff4792db4f6

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\WindowsCodecs.dll
          Filesize

          4KB

          MD5

          21930abbbb06588edf0240cc60302143

          SHA1

          48bf9b838ecb90b8389a0c50b301acc32b44b53e

          SHA256

          8760c4b4cc8fdcd144651d5ba02195d238950d3b70abd7d7e1e2d42b6bda9751

          SHA512

          36b092e22b953a4c984530ee1f3d01aae88084ed8146918316438ee37daefe76ed3cb6dfa39c7a020871a92fc2df0a22b5f4146cdd6437339fe3cff4792db4f6

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\calc.exe
          Filesize

          758KB

          MD5

          60b7c0fead45f2066e5b805a91f4f0fc

          SHA1

          9018a7d6cdbe859a430e8794e73381f77c840be0

          SHA256

          80c10ee5f21f92f89cbc293a59d2fd4c01c7958aacad15642558db700943fa22

          SHA512

          68b9f9c00fc64df946684ce81a72a2624f0fc07e07c0c8b3db2fae8c9c0415bd1b4a03ad7ffa96985af0cc5e0410f6c5e29a30200efff21ab4b01369a3c59b58

        • C:\Users\Admin\Documents\Report Jul 14 34594\3590\calc.exe
          Filesize

          758KB

          MD5

          60b7c0fead45f2066e5b805a91f4f0fc

          SHA1

          9018a7d6cdbe859a430e8794e73381f77c840be0

          SHA256

          80c10ee5f21f92f89cbc293a59d2fd4c01c7958aacad15642558db700943fa22

          SHA512

          68b9f9c00fc64df946684ce81a72a2624f0fc07e07c0c8b3db2fae8c9c0415bd1b4a03ad7ffa96985af0cc5e0410f6c5e29a30200efff21ab4b01369a3c59b58

        • memory/224-154-0x0000000001540000-0x0000000001562000-memory.dmp
          Filesize

          136KB

        • memory/224-156-0x0000000001540000-0x0000000001562000-memory.dmp
          Filesize

          136KB

        • memory/224-158-0x0000000001540000-0x0000000001562000-memory.dmp
          Filesize

          136KB

        • memory/224-155-0x00000000014F0000-0x0000000001519000-memory.dmp
          Filesize

          164KB

        • memory/224-151-0x0000000000000000-mapping.dmp
        • memory/664-162-0x0000000000000000-mapping.dmp
        • memory/2288-147-0x0000000000880000-0x00000000008A2000-memory.dmp
          Filesize

          136KB

        • memory/2288-142-0x0000000000000000-mapping.dmp
        • memory/2288-145-0x0000000000880000-0x00000000008A2000-memory.dmp
          Filesize

          136KB

        • memory/2324-141-0x0000000002E30000-0x0000000002E52000-memory.dmp
          Filesize

          136KB

        • memory/2324-140-0x00000000010F0000-0x0000000001119000-memory.dmp
          Filesize

          164KB

        • memory/2324-139-0x0000000002E30000-0x0000000002E52000-memory.dmp
          Filesize

          136KB

        • memory/2324-136-0x0000000000000000-mapping.dmp
        • memory/2324-143-0x0000000002E30000-0x0000000002E52000-memory.dmp
          Filesize

          136KB

        • memory/3236-149-0x0000000000000000-mapping.dmp
        • memory/3900-144-0x0000000000000000-mapping.dmp
        • memory/3932-157-0x0000000000000000-mapping.dmp
        • memory/3932-159-0x0000000000AB0000-0x0000000000AD2000-memory.dmp
          Filesize

          136KB

        • memory/3932-160-0x0000000000AB0000-0x0000000000AD2000-memory.dmp
          Filesize

          136KB

        • memory/4696-146-0x0000000000000000-mapping.dmp
        • memory/4796-153-0x00007FFE149E0000-0x00007FFE154A1000-memory.dmp
          Filesize

          10.8MB

        • memory/4796-148-0x000002BEF0F70000-0x000002BEF0F92000-memory.dmp
          Filesize

          136KB

        • memory/4928-131-0x0000000000000000-mapping.dmp