Qbot (QakBot) campaigns spread rapidly by delivering a malicious Excel macro that loads a QBot DLL, then injects into msra.exe to harvest browser data and Outlook emails. The operation escalates privileges, moves laterally across all workstations, and uses multi-port SSL-based C2 with defensive evasion such as Defender exclusions.
#Qbot #QakBot #MSRA #LSASS #Outlook #ExcelMacro
#Qbot #QakBot #MSRA #LSASS #Outlook #ExcelMacro
Keypoints
- Malspam delivered an Excel (xls) document that dropped the initial Qbot loader, likely via hidden macros.
- Qbot executed the loader and injected into msra.exe, enabling further actions on the beachhead system.
- A scheduled task was created to escalate privileges to SYSTEM, run only once, and facilitate persistence.
- Qbot moved laterally to adjacent workstations by copying a DLL and remotely creating services; servers were not targeted.
- Credential access was attempted by reading LSASS memory, with API calls from injected processes to LSASS.
- Data collection included browser data and Outlook emails, followed by exfiltration and deletion of local email storage.
- Defense evasion included Windows Defender exclusions and deletion of dropped DLLs after injection.
MITRE Techniques
- [T1566.001] Spearphishing Attachment – The initial access was delivered via an Excel (xls) document in a malspam campaign. Quote: “We assess with medium to high confidence that a malicious email campaign was used to deliver an Excel (xls) document.”
- [T1053.005] Scheduled Task – A scheduled task was created to escalate to SYSTEM privileges, run by msra.exe, and set to run once. Quote: “A scheduled task was created by Qbot to escalate to SYSTEM privileges. This scheduled task was created by the msra.exe process, to be run only once, a few minutes after its creation.”
- [T1055] Process Injection – The QBot DLL loader was executed and shortly after injected into msra.exe. Quote: “The QBot dll was executed on the system and shortly after, injected into the msra.exe process.”
- [T1562.001] Impair Defenses – Windows Defender exclusions were added to prevent detection of the dropped DLL. Quote: “Multiple folders were added to the Windows Defender Exclusions list in order to prevent the Qbot dll placed inside of it from being detected.”
- [T1003.001] LSASS Memory – LSASS was accessed to obtain credentials from memory. Quote: “LSASS was accessed by Qbot, with the intention of accessing credentials.”
- [T1114] Email Collection – Qbot collects emails (Outlook) as part of data collection. Quote: “Collection of browser data from Internet Explorer and Microsoft Edge was also observed with Qbot using the built-in utility esentutl.exe.” (also noted: “Qbot is widely known to steal emails…”)
- [T1555.003] Credentials from Web Browsers – Browser data collection observed. Quote: “Collection of browser data from Internet Explorer and Microsoft Edge was also observed with Qbot…”
- [T1049] System Network Connections Discovery – Lateral movement and network connections observed across hosts. Quote: “The lateral movement activity from the beachhead host was rapid and connections were seen across all workstations in the network.”
- [T1016] System Network Configuration Discovery – Discovery commands observed on beachhead and compromised hosts (e.g., ipconfig, arp). Quote: “The following discovery commands where observed coming from the Qbot processes.”
- [T1135] Network Share Discovery – Lateral movement involved copying DLLs to other machines and remotely creating services (implies discovery of network resources). Quote: “by copying a dll to the machine and then remotely creating a service…”
- [T1043] Commonly Used Port – C2 uses multiple ports (e.g., 88, 443, 25, 995, 2222, etc.). Quote: “Count Port 88 443 25 995 17 2222 3 2078 2 465 2 20 1 993 1 61201 1 50010 1 32100 1 21 1 1194”
- [T1071.001] Web Protocols – C2 over SSL with multiple ports; not solely port 443. Quote: “Qbot uses SSL in it’s C2 communication but does not rely soley on port 443 for communication…”
- [T1041] Exfiltration Over C2 Channel – Data exfiltrated could be used for further attacks or sold. Quote: “The data exfiltrated from the network could be used to conduct further attacks or sold to 3rd parties.”
Indicators of Compromise
- [Network] Observed C2 endpoints and ports – 120.150.218.241:995, 71.74.12.34:443, and 24.229.150.54:995
- [Network] Additional C2 endpoints/ports – 185.250.148.74:443, 136.232.34.70:443, and 82.77.137.101:995
- [File] Dropped payloads and DLLs – ocrafh.html.dll, qbbwlwjmlmnaggd.dll, and 2 more hashes
- [File] Email storage artifacts – EmailStorage__, EmailStorage__ (two variants shown)
Read more: https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/