Analysis

  • max time kernel
    600s
  • max time network
    580s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2023 18:29

General

  • Target

    Agreement_714206_Mar4.xll

  • Size

    589KB

  • MD5

    4c521e25251894b87a8bbae39739d2d2

  • SHA1

    3a12013238a0e5ef70255078ea758f1dc0b686b3

  • SHA256

    c1a941f648d5cc6f24225cb8506153005945638ed50b09020bb1e1980cf80a37

  • SHA512

    4320cac2bb9fd85a57d11676d28a61aca1794ea929bb6206d02a2ea5d1509fed9c563bf7eb916f51af5bb8fb6e7ed41dc9d1bd6e8b419ebcc09bf12ebef45238

  • SSDEEP

    6144:8cTaT6oGCNIamrNSYVntypONtX7EmG2dOdQRG8l/dmMF7VndLmmmmmmm644tkw95:fKpSIm3OdQwgvpVndf42HXDiuJTMw4

Malware Config

Extracted

Family

qakbot

Version

404.266

Botnet

obama242

Campaign

1678805546

C2

92.239.81.124:443

176.202.46.81:443

2.49.58.47:2222

86.225.214.138:2222

74.66.134.24:443

213.31.90.183:2222

12.172.173.82:50001

202.187.87.178:995

70.53.96.223:995

92.154.45.81:2222

186.64.67.54:443

81.158.112.20:2222

190.191.35.122:443

68.173.170.110:8443

12.172.173.82:993

98.145.23.67:443

12.172.173.82:22

37.186.55.60:2222

84.216.198.124:6881

73.161.176.218:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Loads dropped DLL 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Agreement_714206_Mar4.xll
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\SysWOW64\wermgr.exe
      C:\Windows\SysWOW64\wermgr.exe
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:276
      • C:\Windows\SysWOW64\whoami.exe
        whoami /all
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1456
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1692

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\Cab403E.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar7395.tmp
    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • \Users\Admin\AppData\Local\Temp\Agreement_714206_Mar4.xll
    Filesize

    589KB

    MD5

    4c521e25251894b87a8bbae39739d2d2

    SHA1

    3a12013238a0e5ef70255078ea758f1dc0b686b3

    SHA256

    c1a941f648d5cc6f24225cb8506153005945638ed50b09020bb1e1980cf80a37

    SHA512

    4320cac2bb9fd85a57d11676d28a61aca1794ea929bb6206d02a2ea5d1509fed9c563bf7eb916f51af5bb8fb6e7ed41dc9d1bd6e8b419ebcc09bf12ebef45238

  • \Users\Admin\AppData\Local\Temp\Agreement_714206_Mar4.xll
    Filesize

    589KB

    MD5

    4c521e25251894b87a8bbae39739d2d2

    SHA1

    3a12013238a0e5ef70255078ea758f1dc0b686b3

    SHA256

    c1a941f648d5cc6f24225cb8506153005945638ed50b09020bb1e1980cf80a37

    SHA512

    4320cac2bb9fd85a57d11676d28a61aca1794ea929bb6206d02a2ea5d1509fed9c563bf7eb916f51af5bb8fb6e7ed41dc9d1bd6e8b419ebcc09bf12ebef45238

  • memory/748-66-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-73-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-139-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-62-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-63-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-64-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-65-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-97-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-67-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-69-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-72-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-60-0x00000000000F0000-0x00000000000F2000-memory.dmp
    Filesize

    8KB

  • memory/748-75-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-91-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-92-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-95-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/748-96-0x00000000000C0000-0x00000000000E3000-memory.dmp
    Filesize

    140KB

  • memory/1232-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1232-59-0x0000000002FB0000-0x0000000002FD3000-memory.dmp
    Filesize

    140KB

  • memory/1232-58-0x0000000002F70000-0x0000000002FA1000-memory.dmp
    Filesize

    196KB

  • memory/1232-57-0x0000000002FB0000-0x0000000002FD3000-memory.dmp
    Filesize

    140KB

  • memory/1232-61-0x0000000002FB0000-0x0000000002FD3000-memory.dmp
    Filesize

    140KB