Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 44650c0

Browse files
authored
Merge pull request #198 from martyav/qakbot
Qakbot
2 parents 9a8a03b + 2ced281 commit 44650c0

File tree

6 files changed

+315
-0
lines changed

6 files changed

+315
-0
lines changed
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
# Process injection by Qakbot malware
2+
3+
This query was originally published in the threat analytics report, *Qakbot blight lingers, seeds ransomware*
4+
5+
[Qakbot](https://www.microsoft.com/security/blog/2017/11/06/mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks/) is malware that steals login credentials from banking and financial services. It has been deployed against small businesses as well as major corporations. Some outbreaks have involved targeted ransomware campaigns that use a similar set of techniques. Links to related queries are listed under [See also](#See-also).
6+
7+
The following query detects if Qakbot has injected code into the *ping.exe* process, to evade security and access credentials.
8+
9+
## Query
10+
11+
```Kusto
12+
DeviceProcessEvents
13+
| where FileName == "esentutl.exe"
14+
| where ProcessCommandLine has "WebCache"
15+
| where ProcessCommandLine has_any ("V01", "/s", "/d")
16+
| project ProcessCommandLine, InitiatingProcessParentFileName,
17+
DeviceId, Timestamp
18+
```
19+
20+
## Category
21+
22+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
23+
24+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
25+
|-|-|-|
26+
| Initial access | | |
27+
| Execution | | |
28+
| Persistence | | |
29+
| Privilege escalation | | |
30+
| Defense evasion | v | |
31+
| Credential Access | v | |
32+
| Discovery | | |
33+
| Lateral movement | | |
34+
| Collection | | |
35+
| Command and control | | |
36+
| Exfiltration | | |
37+
| Impact | | |
38+
| Vulnerability | | |
39+
| Misconfiguration | | |
40+
| Malware, component | | |
41+
42+
## See also
43+
44+
* [Registry edits by campaigns using Qakbot malware](..\Persistence\qakbot-campaign-self-deletion.md)
45+
* [Self-deletion by Qakbot malware](..\Defense evasion\qakbot-campaign-registry-edit.md)
46+
* [Browser cookie theft by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-esentutl.md)
47+
* [Outlook email access by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-outlook.md)
48+
* [Javascript use by Qakbot malware](..\Execution\qakbot-campaign-suspicious-javascript.md)
49+
50+
## Contributor info
51+
52+
**Contributor:** Microsoft Threat Protection team
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# Self-deletion by Qakbot malware
2+
3+
This query was originally published in the threat analytics report, *Qakbot blight lingers, seeds ransomware*
4+
5+
[Qakbot](https://www.microsoft.com/security/blog/2017/11/06/mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks/) is malware that steals login credentials from banking and financial services. It has been deployed against small businesses as well as major corporations. Some outbreaks have involved targeted ransomware campaigns that use a similar set of techniques. Links to related queries are listed under [See also](#See-also).
6+
7+
The following query detects if an instance of Qakbot has attempted to overwrite its original binary.
8+
9+
## Query
10+
11+
```Kusto
12+
DeviceProcessEvents
13+
| where FileName =~ "ping.exe"
14+
| where InitiatingProcessFileName =~ "cmd.exe"
15+
| where InitiatingProcessCommandLine has "calc.exe" and
16+
InitiatingProcessCommandLine has "-n 6"
17+
and InitiatingProcessCommandLine has "127.0.0.1"
18+
| project ProcessCommandLine, InitiatingProcessCommandLine,
19+
InitiatingProcessParentFileName, DeviceId, Timestamp
20+
```
21+
22+
## Category
23+
24+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
25+
26+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
27+
|-|-|-|
28+
| Initial access | | |
29+
| Execution | | |
30+
| Persistence | | |
31+
| Privilege escalation | | |
32+
| Defense evasion | v | |
33+
| Credential Access | | |
34+
| Discovery | | |
35+
| Lateral movement | | |
36+
| Collection | | |
37+
| Command and control | | |
38+
| Exfiltration | | |
39+
| Impact | | |
40+
| Vulnerability | | |
41+
| Misconfiguration | | |
42+
| Malware, component | | |
43+
44+
## See also
45+
46+
* [Registry edits by campaigns using Qakbot malware](..\Persistence\qakbot-campaign-registry-edit.md)
47+
* [Process injection by Qakbot malware](..\Defense evasion\qakbot-campaign-process-injection.md)
48+
* [Browser cookie theft by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-esentutl.md)
49+
* [Outlook email access by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-outlook.md)
50+
* [Javascript use by Qakbot malware](..\Execution\qakbot-campaign-suspicious-javascript.md)
51+
52+
## Contributor info
53+
54+
**Contributor:** Microsoft Threat Protection team
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
# Browser cookie theft by campaigns using Qakbot malware
2+
3+
This query was originally published in the threat analytics report, *Qakbot blight lingers, seeds ransomware*
4+
5+
[Qakbot](https://www.microsoft.com/security/blog/2017/11/06/mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks/) is malware that steals login credentials from banking and financial services. It has been deployed against small businesses as well as major corporations. Some outbreaks have involved targeted ransomware campaigns that use a similar set of techniques. Links to related queries are listed under [See also](#See-also).
6+
7+
The following query detects possible use of the system process, *esentutl.exe*, to look through a user's browser history and steal cookies.
8+
9+
## Query
10+
11+
```Kusto
12+
DeviceProcessEvents
13+
| where FileName == "esentutl.exe"
14+
| where ProcessCommandLine has "WebCache"
15+
| where ProcessCommandLine has_any ("V01", "/s", "/d")
16+
| project ProcessCommandLine,
17+
InitiatingProcessParentFileName, DeviceId, Timestamp
18+
```
19+
20+
## Category
21+
22+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
23+
24+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
25+
|-|-|-|
26+
| Initial access | | |
27+
| Execution | | |
28+
| Persistence | | |
29+
| Privilege escalation | | |
30+
| Defense evasion | | |
31+
| Credential Access | v | |
32+
| Discovery | v | |
33+
| Lateral movement | | |
34+
| Collection | | |
35+
| Command and control | | |
36+
| Exfiltration | | |
37+
| Impact | | |
38+
| Vulnerability | | |
39+
| Misconfiguration | | |
40+
| Malware, component | | |
41+
42+
## See also
43+
44+
* [Self-deletion by Qakbot malware](..\Defense evasion\qakbot-campaign-self-deletion.md)
45+
* [Process injection by Qakbot malware](..\Defense evasion\qakbot-campaign-process-injection.md)
46+
* [Registry edits by campaigns using Qakbot malware](..\Persistence\qakbot-campaign-registry-edit.md)
47+
* [Outlook email access by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-outlook.md)
48+
* [Javascript use by Qakbot malware](..\Execution\qakbot-campaign-suspicious-javascript.md)
49+
50+
## Contributor info
51+
52+
**Contributor:** Microsoft Threat Protection team
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
# Outlook email access by campaigns using Qakbot malware
2+
3+
This query was originally published in the threat analytics report, *Qakbot blight lingers, seeds ransomware*
4+
5+
[Qakbot](https://www.microsoft.com/security/blog/2017/11/06/mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks/) is malware that steals login credentials from banking and financial services. It has been deployed against small businesses as well as major corporations. Some outbreaks have involved targeted ransomware campaigns that use a similar set of techniques. Links to related queries are listed under [See also](#See-also).
6+
7+
The following query detects attempts to access files in the local path that contain Outlook emails.
8+
9+
## Query
10+
11+
```Kusto
12+
DeviceFileEvents
13+
| where FolderPath hasprefix "EmailStorage"
14+
| where FolderPath has "Outlook"
15+
| project FileName, FolderPath, InitiatingProcessFileName,
16+
InitiatingProcessCommandLine, DeviceId, Timestamp
17+
```
18+
19+
## Category
20+
21+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
22+
23+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
24+
|-|-|-|
25+
| Initial access | | |
26+
| Execution | | |
27+
| Persistence | | |
28+
| Privilege escalation | | |
29+
| Defense evasion | | |
30+
| Credential Access | | |
31+
| Discovery | v | |
32+
| Lateral movement | | |
33+
| Collection | | |
34+
| Command and control | | |
35+
| Exfiltration | | |
36+
| Impact | | |
37+
| Vulnerability | | |
38+
| Misconfiguration | | |
39+
| Malware, component | | |
40+
41+
## See also
42+
43+
* [Self-deletion by Qakbot malware](..\Defense evasion\qakbot-campaign-self-deletion.md)
44+
* [Process injection by Qakbot malware](..\Defense evasion\qakbot-campaign-process-injection.md)
45+
* [Registry edits by campaigns using Qakbot malware](..\Persistence\qakbot-campaign-registry-edit.md)
46+
* [Browser cookie theft by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-esentutl.md)
47+
* [Javascript use by Qakbot malware](..\Execution\qakbot-campaign-suspicious-javascript.md)
48+
49+
## Contributor info
50+
51+
**Contributor:** Microsoft Threat Protection team
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
# Javascript use by Qakbot malware
2+
3+
This query was originally published in the threat analytics report, *Qakbot blight lingers, seeds ransomware*
4+
5+
[Qakbot](https://www.microsoft.com/security/blog/2017/11/06/mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks/) is malware that steals login credentials from banking and financial services. It has been deployed against small businesses as well as major corporations. Some outbreaks have involved targeted ransomware campaigns that use a similar set of techniques. Links to related queries are listed under [See also](#See-also).
6+
7+
The following query detects possible attempts by Qakbot to execute malicious Javascript code.
8+
9+
## Query
10+
11+
```Kusto
12+
DeviceProcessEvents
13+
| where InitiatingProcessFileName == "cmd.exe"
14+
| where FileName == "cscript.exe"
15+
| where InitiatingProcessCommandLine has "start /MIN"
16+
| where ProcessCommandLine has "E:javascript"
17+
| project ProcessCommandLine,
18+
InitiatingProcessCommandLine, DeviceId, Timestamp
19+
```
20+
21+
## Category
22+
23+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
24+
25+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
26+
|-|-|-|
27+
| Initial access | | |
28+
| Execution | v | |
29+
| Persistence | | |
30+
| Privilege escalation | | |
31+
| Defense evasion | | |
32+
| Credential Access | | |
33+
| Discovery | | |
34+
| Lateral movement | | |
35+
| Collection | | |
36+
| Command and control | | |
37+
| Exfiltration | | |
38+
| Impact | | |
39+
| Vulnerability | | |
40+
| Misconfiguration | | |
41+
| Malware, component | | |
42+
43+
## See also
44+
45+
* [Self-deletion by Qakbot malware](..\Defense evasion\qakbot-campaign-self-deletion.md)
46+
* [Process injection by Qakbot malware](..\Defense evasion\qakbot-campaign-process-injection.md)
47+
* [Registry edits by campaigns using Qakbot malware](..\Persistence\qakbot-campaign-registry-edit.md)
48+
* [Browser cookie theft by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-esentutl.md)
49+
* [Outlook email access by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-outlook.md)
50+
51+
## Contributor info
52+
53+
**Contributor:** Microsoft Threat Protection team
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
# Registry edits by campaigns using Qakbot malware
2+
3+
This query was originally published in the threat analytics report, *Qakbot blight lingers, seeds ransomware*
4+
5+
[Qakbot](https://www.microsoft.com/security/blog/2017/11/06/mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks/) is malware that steals login credentials from banking and financial services. It has been deployed against small businesses as well as major corporations. Some outbreaks have involved targeted ransomware campaigns that use a similar set of techniques. Links to related queries are listed under [See also](#See-also).
6+
7+
The following query detects registry entries that may indicate that an operator is trying to establish persistence for the Qakbot binary.
8+
9+
## Query
10+
11+
```Kusto
12+
DeviceRegistryEvents
13+
| where ActionType == "RegistryValueSet"
14+
| where InitiatingProcessFileName == "explorer.exe"
15+
| where RegistryValueData has @"AppData\Roaming\Microsoft" and
16+
RegistryValueData has "$windowsupdate"
17+
| where RegistryKey has @"CurrentVersion\Run"
18+
| project RegistryKey, RegistryValueData, DeviceId, Timestamp
19+
```
20+
21+
## Category
22+
23+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
24+
25+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
26+
|-|-|-|
27+
| Initial access | | |
28+
| Execution | | |
29+
| Persistence | v | |
30+
| Privilege escalation | | |
31+
| Defense evasion | | |
32+
| Credential Access | | |
33+
| Discovery | | |
34+
| Lateral movement | | |
35+
| Collection | | |
36+
| Command and control | | |
37+
| Exfiltration | | |
38+
| Impact | | |
39+
| Vulnerability | | |
40+
| Misconfiguration | | |
41+
| Malware, component | | |
42+
43+
## See also
44+
45+
* [Self-deletion by Qakbot malware](..\Defense evasion\qakbot-campaign-self-deletion.md)
46+
* [Process injection by Qakbot malware](..\Defense evasion\qakbot-campaign-process-injection.md)
47+
* [Browser cookie theft by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-esentutl.md)
48+
* [Outlook email access by campaigns using Qakbot malware](..\Discovery\qakbot-campaign-outlook.md)
49+
* [Javascript use by Qakbot malware](..\Execution\qakbot-campaign-suspicious-javascript.md)
50+
51+
## Contributor info
52+
53+
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)