杏吧传媒

Search
searchclose icon

Threat Advisory: Qakbot Activity Is Rising

Glitch effectGlitch effectGlitch effect
Glitch banner

Qakbot has been spreading like wildfire. 杏吧传媒 has seen a 400% increase in Qakbot cases in the past two months (several hundred incidents) in comparison to numbers from all of 2022 spread out over our 1.8 million protected endpoints.


What You Need to Know

QakBot is continuously maintained and developed and has evolved from a banking trojan information stealer, to form botnets, and into a delivery agent for ransomware. It is modular in nature enabling malicious cyber actors to configure it to their needs. (CISA, 2021)听

Check out the below video to watch our interview with 鈥攐r keep reading to learn more.

1. The threat primarily comes in via email.

Based on 杏吧传媒鈥 telemetry in Q3/Q4 2022, Qakbot鈥檚 initial access has been primarily through email HTML attachments that drop a ZIP into the user鈥檚 Downloads folder (`C:\users\*\downloads\*.zip`). Users then unzip and interact with the .LNK (Windows shortcut), which mounts an ISO, where Qakbot then begins its malicious execution and persistence.

Prevention is key to keeping this threat in check.

  • Minimize your or your clients' attack surface by using an email filtering system
  • Educate your users on how to deal with this threat via security awareness training

The real Qakbot execution begins once a user clicks on a .LNK contained within the .ISO. This second .LNK will typically trigger a short obfuscated script (.cmd or .js are common), which then locates and executes a Qakbot .DLL.

The Qakbot DLL is typically executed via or 杏吧传媒 also observed legitimate applications (calc.exe, control.exe) used to load the malware via .
In these cases, the qakbot DLL and 鈥渓egitimate鈥 application will both be located within the mounted .iso file.听

  • Eg `regsvr32 gaffes\twinkle.dll` (utilising regsvr32)
  • Cmd.exe /c control.exe (utilising dll sideloading)

2. One way Qakbot launches is by mounting an ISO鈥攂ut you can limit this capability by editing the registry.听

We have seen Qakbot launch by mounting an ISO or VHD. You can limit this capability by editing the registry.

This has a great write-up on how to limit mounting an ISO. By the way, if some workstations need to work with ISOs, then maybe this isn鈥檛 the mitigation to apply to them and, instead, rely on more aggressive monitoring. The name of the game is risk mitigation and lessening your attack surface.

3. Qakbot is known to evade antivirus (AV) tools.

The developers of Qakbot continue to update their software, making detection via next-gen AV (NGAV) challenging. Here鈥檚 why:

  • It relies on user interaction for its initial execution and early-stage unraveling听
  • It actually doesn鈥檛 do anything malicious for the middle stage of its activities except mount and unravel folders
  • The 鈥渕iddle stage鈥 activities are updated regularly, turning reliable detection into a constant cat-and-mouse game
  • When it does do something malicious, it leverages process injection techniques to evade many AV solutions

Managed endpoint detection and response (EDR) solutions that see the processes executing and prevent their spread are critical for early remediation.

Below we can see the 鈥淐ontrol.exe鈥 from before. Silently it uses dll sideloading to load edputil.dll. Before ultimately executing msoffice.dll (qakbot) via regsvr32.

After successfully executing and injecting into wermgr.exe (a common qakbot target), we can also observe common enumeration commands executed via Qakbot.听

Qakbot contains an embedded and encrypted list of commands that can be run. The team developed a script to extract these using Dumpulator. A subset of which looks like this:

Once executed successfully, Qakbot will move itself to a new folder and create persistence via a RunKey or Scheduled Task (depending on available privileges). Both of these utilize regsvr32 and rundll32 in conjunction with random file and folder names.

Keep an eye out for things like these:



4. Basic cyber hygiene is your friend.

It may seem redundant to mention patching and updating, but they are the most basic form of cyber hygiene available. Never underestimate the power of performing these two simple tasks. Create an expected cadence for this activity, so it is always on the radar and not overlooked.

For example, Microsoft is always releasing security updates that try to mitigate/address known attack vectors. Patching regularly and consistently will keep your endpoints protected.

5. Disable administrative shares on workstations.听

Some but not all variants of Qakbot propagate to multiple machines via SMB shares, so disabling SMB shares may be appropriate as a potential preventive measure.听

Caution: This hardening may have other side effects, so review your environment and make sure it won鈥檛 have negative consequences.听

  • Some RMM software requires access to administrative shares for installs.
  • For more information on disabling admin shares, follow

6. If Qakbot gets into an environment, deal with it quickly.听

The longer it stays, the harder it is to kick out. In addition, Qakbot has self-defense mechanisms such as the ability to detect a shutdown and, if running in memory, will spawn persistence on shutdown.听

Isolating infected hosts from the rest of the network is key to stopping the spread.听听

Unfortunately, this is the type of threat best dealt with hands-on.听 We all love to fix issues remotely, but you are going to have better success with boots on the ground at the client/user鈥檚 site.听听

  • Some of the most successful cases of handling Qakbot have involved partners who set up a dedicated LAN that does talk to the rest of the network (something as simple as an old router separating the infected machines from the rest of the network)

If you do see an active Qakbot infection in your network, check out this packed with handy remediation steps.

7. With Qakbot, you need to understand and set expectations with your clients about what the "win" is when fighting this malware.听听

Winning is catching and evicting the threat actor before they can leverage this access to create a botnet, exfiltrate data or spread ransomware.听听

This includes mass isolation of entire networks to contain the threat. While we have seen organizations go offline for an entire day, it is better to be slow and thorough in order to avoid reinfection and having to repeat the process again.听

What You Should Do

Your call to action is to take action to reduce your client鈥檚 attack surface and start the conversations now about potential downtime.

It is a whole lot easier to have these conversations when things are working instead of having to talk about it in the middle of an incident.

Share

Sign Up for 杏吧传媒 Updates

Get insider access to 杏吧传媒 tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
杏吧传媒 at work