{"id":13532,"date":"2023-03-01T11:53:57","date_gmt":"2023-03-01T11:53:57","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=13532"},"modified":"2023-03-01T12:05:42","modified_gmt":"2023-03-01T12:05:42","slug":"new-qakbot-spreading-ways","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/new-qakbot-spreading-ways\/","title":{"rendered":"Qakbot Malware Applies New Distribution Methods"},"content":{"rendered":"<p>Today there is an arms race between cybercriminals and antimalware manufacturers. While some release a fix for an existing threat, others must develop new loopholes. Recently, cybersecurity experts noticed that many malware families were using OneNote attachments to infect their victims. Since <strong>OneNote is considered a robust application<\/strong> that Microsoft has developed for easy note-taking, hackers couldn&#8217;t help but take advantage of it for their nefarious purposes. Next, we will look at some relatively new ways of spreading the known Qakbot banking Trojan.<\/p>\n<h2>What is Qbot?<\/h2>\n<p>Before moving on to distribution methods, let&#8217;s recap QakBot. Qakbot Malware (QuakBot, or QBot) is a <a href=\"https:\/\/gridinsoft.com\/spyware\/qakbot\">banking Trojan<\/a> designed to steal confidential information from Windows computers. For starters, it is worth mentioning that this type of malware is nothing new, and it appeared in 2007. Since then, it has undergone many changes, primarily <strong>aimed at bypassing security features<\/strong>. What has stayed the same, however, is the distribution method. For the most part, it&#8217;s email spam. However, after infecting one machine, QakBot can spread to other devices on the network.<\/p>\n<p>Furthermore, it has modular protection. Hence, the operator can fully customize it according to the objectives. For example, it can be network reconnaissance, keylogging, credential theft, botnet deployment, <a href=\"https:\/\/gridinsoft.com\/ransomware\">or ransomware<\/a>. In some cases, botnets under the rule of QakBot were delivering <a href=\"https:\/\/gridinsoft.com\/backdoor\/cobaltstrike\">CobaltStrike beacons<\/a>.<\/p>\n<h2>Distribution using OneNote Using Batch &#038; PowerShell<\/h2>\n<p>The primary method of spreading Qakbot is <a href=\"https:\/\/gridinsoft.com\/spam\">through e-mail spamming<\/a>. Previously, a rogue email contained an MS Office file with a <a href=\"https:\/\/gridinsoft.com\/macro-attack\">malicious macro hidden inside<\/a>. However, after <strong>Microsoft forcibly disabled the execution of any macros coming from the Internet<\/strong>, Qakbot started attaching the OneNote attachment. Usually, such an email contains something like &#8220;RE: DRCP Hire-Success Story&#8230;&#8221; and attachments are usually masked as legitimate files and named, for example, &#8220;Contracts &#8211; Copy.one&#8221;.<\/p>\n<p>A <a href=\"https:\/\/gridinsoft.com\/phishing\">fake cloud attachment page opens<\/a> when the victim opens the OneNote attachment. This is done <strong>to get the victim to click on the BAT file<\/strong> (let&#8217;s call it Open.bat) that is embedded in Contracts &#8211; Copy.one. A PowerShell script is started as soon as the user runs this file, which in turn puts a CMD file with the conditional name &#8220;i.cmd&#8221; into the <strong>%temp%<\/strong> folder and runs it. This action is performed in a mode <strong>hidden from the user and not displaying any notifications<\/strong>. It then uses a PowerShell script to download a GIF file using the Invoke-Webrequest command. Although this file is saved as a JPG file in <strong>%programdata%<\/strong>, it has nothing to do with image files. Instead, it is an executable Qakbot DLL file that Rundll32.exe runs with the &#8220;Wind&#8221; parameter.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-delivery-using-Batch-PowerShell_790x288px.webp\" alt=\"QakBot Delivery Mechanism Using JScript and Batch Script\" width=\"790\" height=\"288\" class=\"aligncenter size-full wp-image-13551\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-delivery-using-Batch-PowerShell_790x288px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-delivery-using-Batch-PowerShell_790x288px-300x109.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-delivery-using-Batch-PowerShell_790x288px-768x280.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<h2>Distribution Via OneNote Using Jscript (.jse) file<\/h2>\n<p>Similarly to the previous point, the initial stage of the infection process occurs via phishing emails, which also contain a OneNote attachment. However, unlike the last end, <strong>this attachment includes a JSE file<\/strong>. This file also contains a hidden Bat file, usually disguised as an &#8220;Open&#8221; button. After the user clicks this button, the batch file is launched. PowerShell script downloads the pseudo-gif file into a Temp system folder. This file is also different from what it looks like. It is an executable Qakbot DLL file which performs the routine unfolding process, same as in any other case scenario.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_QakBot-Delivery-Mechanism-Using-JScript-and-Batch-Script_790x288px.webp\" alt=\"QakBot Delivery Mechanism Using JScript and Batch Script\" width=\"790\" height=\"288\" class=\"aligncenter size-full wp-image-13552\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_QakBot-Delivery-Mechanism-Using-JScript-and-Batch-Script_790x288px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_QakBot-Delivery-Mechanism-Using-JScript-and-Batch-Script_790x288px-300x109.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_QakBot-Delivery-Mechanism-Using-JScript-and-Batch-Script_790x288px-768x280.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<h2>Distribution using html Application (.hta) file<\/h2>\n<p>At the end of January 2023, Qakbot operators began experimenting with this new distribution method. It is identical to the previous way, except that instead of a JSE file, OneNote files contain <strong>an embedded HTML application (HTA file)<\/strong>. When the user clicks &#8220;open&#8221; on the OneNote page, it drops an embedded .hta file executed by mshta.exe in the background. The script in the HTA file uses the legitimate curl.exe application to load the Qakbot DLL file into the <strong>C:\\ProgramData<\/strong> folder and then run it. The Qakbot payload is injected into the Windows Auxiliary Technology Manager &#8220;AtBroker.exe&#8221; to hide its presence.<\/p>\n<h2>Distribution using Windows Script (.wsf) Files<\/h2>\n<p>In this case, the phishing email contains an attachment in the form of a zip file with a random name, e.g., &#8220;Shared Document From Cloud 540318.zip&#8221;. There may be several files in the archive, including a wsf file. This file contains malicious JScript between digital certificates. Hence when a victim tries to open the .wsf file, it will run code to download the Qakbot DLL file. Usually, it is loaded in the <strong>C:\\ProgramData<\/strong> directory and run using &#8220;Rundll32.exe&#8221; with the parameter &#8220;Wind&#8221;.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-Delivery-Mechanism-using-wsf-file_790x288px.webp\" alt=\"Qakbot Delivery Mechanism using wsf file\" width=\"790\" height=\"288\" class=\"aligncenter size-full wp-image-13553\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-Delivery-Mechanism-using-wsf-file_790x288px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-Delivery-Mechanism-using-wsf-file_790x288px-300x109.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/02\/GS_Blog_Qakbot-Delivery-Mechanism-using-wsf-file_790x288px-768x280.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<h2>Distribution using Google Ads<\/h2>\n<p>Since Microsoft, by default, <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployoffice\/security\/internet-macros-blocked\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">blocks macros execution<\/a> in Office files downloaded from the Internet, attackers are finding ever more sophisticated ways to distribute malware. Thus lately, there has been a <a href=\"https:\/\/gridinsoft.com\/blogs\/google-search-malvertising-fake-ads\/\">significant surge in malicious ads<\/a> that lead to a fake page of a legitimate program. Thus lately, there has been a significant surge in malicious advertising, which leads to a fake page of a legitimate program. However, instead of the legitimate program, the user receives malware. It may usually be a .exe or .msi file, which contains malware and <strong>many empty sections to avoid detection by anti-malware engine<\/strong>, as it overwhelms their file size limit.<\/p>\n<figure id=\"attachment_13218\" aria-describedby=\"caption-attachment-13218\" style=\"width: 2138px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad.jpg\" alt=\"Fake Libreoffice ad\" width=\"2138\" height=\"538\" class=\"size-full wp-image-13218\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad.jpg 2138w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad-300x75.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad-1024x258.jpg 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad-768x193.jpg 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad-1536x387.jpg 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad-2048x515.jpg 2048w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/01\/fake-libreoffice-ad-1568x395.jpg 1568w\" sizes=\"auto, (max-width: 2138px) 100vw, 2138px\" \/><figcaption id=\"caption-attachment-13218\" class=\"wp-caption-text\">Fake LibreOffice ad that tries to mimic the original site&#8217;s URL<\/figcaption><\/figure>\n<h2>How to avoid Qakbot Malware infection<\/h2>\n<p>To minimize the risk of Qakbot Malware infection, we recommend following cyber hygiene practices and the recommendations below:<\/p>\n<ul>\n<li><strong>Be careful when dealing with email<\/strong>. Please do not open <a href=\"https:\/\/gridinsoft.com\/blogs\/phishing-most-common-cyberattack\/\">emails from unknown or unverified senders.<\/a><\/li>\n<li><strong>Avoid <a href=\"https:\/\/gridinsoft.com\/blogs\/torrenting-is-it-legal\/\">downloading pirated software<\/a> from unverified sites like Torrent\/Warez<\/strong>. Most often, pirated software contains unpleasant bonuses in the form of Trojans or ransomware.<\/li>\n<li><strong>Use strong passwords, update them regularly, and <a href=\"https:\/\/gridinsoft.com\/mfa\">use multifactor authentication<\/a><\/strong> wherever possible. Passwords that are too easy can be compromised <a href=\"https:\/\/gridinsoft.com\/brute-force\">by brute force<\/a>. Multifactor authentication can protect passwords if data breaches have compromised them.<\/li>\n<li><strong>Use a <a href=\"https:\/\/gridinsoft.com\/antimalware\">strong security solution<\/a> on all devices<\/strong>, including PCs, laptops, and mobile devices.<\/li>\n<li><strong><a href=\"https:\/\/gridinsoft.com\/blogs\/data-loss-prevention\/\">Include data loss prevention<\/a><\/strong> (DLP) solutions on employee systems.<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>The Qakbot malware provides a prime example of how the threat landscape is changing. Its complex structure, impact, and distribution underscore the importance of maintaining cybersecurity vigilance. Moreover, as discussed at the outset, attackers using Qakbot consistently adapt their methods, using innovative attack vectors such as OneNote and Google Ads attachments to avoid detection, reinforcing the need for proactive and robust security measures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today there is an arms race between cybercriminals and antimalware manufacturers. While some release a fix for an existing threat, others must develop new loopholes. Recently, cybersecurity experts noticed that many malware families were using OneNote attachments to infect their victims. Since OneNote is considered a robust application that Microsoft has developed for easy note-taking, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":13561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[4],"tags":[619,1003,437,48,670],"class_list":{"0":"post-13532","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips-tricks","8":"tag-cybersecurity","9":"tag-powershell","10":"tag-qbot","11":"tag-spyware","12":"tag-threats"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/GS_Blog_banner_Qakbot-Malware-Applies-New-Distribution-Methods_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=13532"}],"version-history":[{"count":19,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13532\/revisions"}],"predecessor-version":[{"id":13560,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13532\/revisions\/13560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/13561"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=13532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=13532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=13532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}