{"id":11877,"date":"2018-03-28T09:10:02","date_gmt":"2018-03-28T17:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/28\/news-5646\/"},"modified":"2018-03-28T09:10:02","modified_gmt":"2018-03-28T17:10:02","slug":"news-5646","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/28\/news-5646\/","title":{"rendered":"An in-depth malware analysis of QuantLoader"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 28 Mar 2018 16:00:00 +0000<\/strong><\/p>\n<p><em>This guest post is written by Vishal Thakur, CSIRT\/Salesforce. For more on Vishal, read his bio at the end of the blog.<\/em><\/p>\n<p>QuantLoader is a Trojan downloader that has been available for sale on underground forums for quite some time now. It has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. The campaign that we are going to analyze is serving a BackDoor.<\/p>\n<p>In this post, we&#8217;ll take both a high-level look at the campaign flow, as well as a deep dive into how the malware executes, with a focus on the networking functions. We&#8217;ll dig into the binary to analyze how the malware executes and how it connects back to the C2. We&#8217;ll also analyze some interesting calls the malware makes, like calling and executing the netsh command to change local firewall rules.<\/p>\n<p>The latest version of QuantLoader is being served through a phishing campaign using some interesting techniques. The campaign starts with a phishing email that comes with a link serving the victim the initial JS downloader. What&#8217;s interesting is that they&#8217;ve opted for a file:\/\/ (SMB) protocol rather than the traditional http:\/\/\u2014maybe in order to get past some proxies\/firewalls.<\/p>\n<h3>Analysis<\/h3>\n<p>First of all, let\u2019s have a look at the campaign flow:<\/p>\n<p><strong>Phish &gt; JS downloader &gt; QuantLoader (&gt; C2) &gt; Payload (Backdoor) &gt; C2<\/strong><\/p>\n<p>The JS downloader, as always, has lots of code, all obfuscated:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22739\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/jsdownloader\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader.png\" data-orig-size=\"974,279\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"JSdownloader\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader-300x86.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader-600x172.png\" class=\"aligncenter size-large wp-image-22739\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader-600x172.png\" alt=\"\" width=\"600\" height=\"172\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader-600x172.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader-300x86.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader-965x279.png 965w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader.png 974w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22740\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/jsdownloader2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2.png\" data-orig-size=\"974,258\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"JSdownloader2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2-300x79.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2-600x159.png\" class=\"aligncenter size-large wp-image-22740\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2-600x159.png\" alt=\"\" width=\"600\" height=\"159\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2-600x159.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2-300x79.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2-965x258.png 965w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader2.png 974w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22741\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/jsdownloader3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader3.png\" data-orig-size=\"974,308\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"JSdownloader3\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader3-300x95.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader3-600x190.png\" class=\"aligncenter size-large wp-image-22741\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader3-600x190.png\" alt=\"\" width=\"600\" height=\"190\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader3-600x190.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader3-300x95.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/JSdownloader3.png 974w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>We go ahead and print the output of the main function (AXXA in this case) and we get the stage 2 URLs:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22742\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/4-5-6-js\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/4-5-6-JS.png\" data-orig-size=\"570,69\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4-5-6-JS\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/4-5-6-JS-300x36.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/4-5-6-JS.png\" class=\"aligncenter size-full wp-image-22742\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/4-5-6-JS.png\" alt=\"\" width=\"570\" height=\"69\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/4-5-6-JS.png 570w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/4-5-6-JS-300x36.png 300w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\" \/><\/p>\n<p>That was a quick analysis of the JS downloader, to get us the URLs.<\/p>\n<h3>QuantLoader executable<\/h3>\n<p>We are going to start by following the execution flow as much as possible:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22743\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/7-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/7-bin.png\" data-orig-size=\"1592,276\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"7-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/7-bin-300x52.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/7-bin-600x104.png\" class=\"aligncenter size-large wp-image-22743\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/7-bin-600x104.png\" alt=\"\" width=\"600\" height=\"104\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/7-bin-600x104.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/7-bin-300x52.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/7-bin.png 1592w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Let\u2019s take a look at the assembly code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22744\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/8-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/8-bin.png\" data-orig-size=\"810,169\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"8-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/8-bin-300x63.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/8-bin-600x125.png\" class=\"aligncenter size-large wp-image-22744\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/8-bin-600x125.png\" alt=\"\" width=\"600\" height=\"125\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/8-bin-600x125.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/8-bin-300x63.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/8-bin.png 810w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Next, it will copy itself to the above location before execution:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22746\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/9-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/9-bin.png\" data-orig-size=\"809,276\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"9-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/9-bin-300x102.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/9-bin-600x205.png\" class=\"aligncenter size-large wp-image-22746\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/9-bin-600x205.png\" alt=\"\" width=\"600\" height=\"205\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/9-bin-600x205.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/9-bin-300x102.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/9-bin.png 809w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Setting the right permissions (ACL):<\/p>\n<p>Here, we can see that the permission for the user has been set to &#8220;Read.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22747\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/10-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/10-bin.png\" data-orig-size=\"806,251\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"10-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/10-bin-300x93.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/10-bin-600x187.png\" class=\"aligncenter size-large wp-image-22747\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/10-bin-600x187.png\" alt=\"\" width=\"600\" height=\"187\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/10-bin-600x187.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/10-bin-300x93.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/10-bin.png 806w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Stack view:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22748\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/11-bin-stack\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/11-bin-stack.png\" data-orig-size=\"725,40\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"11-bin-stack\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/11-bin-stack-300x17.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/11-bin-stack-600x33.png\" class=\"aligncenter size-large wp-image-22748\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/11-bin-stack-600x33.png\" alt=\"\" width=\"600\" height=\"33\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/11-bin-stack-600x33.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/11-bin-stack-300x17.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/11-bin-stack.png 725w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Let&#8217;s have a look at the process execution and persistence mechanisms.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22749\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/12-proc\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/12-proc.png\" data-orig-size=\"402,248\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"12-proc\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/12-proc-300x185.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/12-proc.png\" class=\"aligncenter size-full wp-image-22749\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/12-proc.png\" alt=\"\" width=\"402\" height=\"248\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/12-proc.png 402w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/12-proc-300x185.png 300w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/><\/p>\n<p>As you can see above, the process spawns a new process after it has successfully copied itself to a different location. It is important not to confuse it with dwm.exe, a legit Windows process (Desktop Window Manager). Note that the persistence mechanism has also been initiated.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22750\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/13-proc\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/13-proc.png\" data-orig-size=\"640,264\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"13-proc\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/13-proc-300x124.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/13-proc-600x248.png\" class=\"aligncenter size-large wp-image-22750\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/13-proc-600x248.png\" alt=\"\" width=\"600\" height=\"248\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/13-proc-600x248.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/13-proc-300x124.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/13-proc.png 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Let&#8217;s take a deeper look into this process that is spawned, and how it is spawned.<\/p>\n<p>First, the directory is created:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22751\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/14-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/14-bin.png\" data-orig-size=\"815,71\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"14-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/14-bin-300x26.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/14-bin-600x52.png\" class=\"aligncenter size-large wp-image-22751\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/14-bin-600x52.png\" alt=\"\" width=\"600\" height=\"52\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/14-bin-600x52.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/14-bin-300x26.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/14-bin.png 815w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Once that is completed, CreateFile is called to create a null file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22752\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/15-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/15-bin.png\" data-orig-size=\"811,176\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"15-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/15-bin-300x65.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/15-bin-600x130.png\" class=\"aligncenter size-large wp-image-22752\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/15-bin-600x130.png\" alt=\"\" width=\"600\" height=\"130\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/15-bin-600x130.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/15-bin-300x65.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/15-bin.png 811w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>At this point it\u2019s a null file\u2014no data in it. That will be copied over later.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22754\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/16-dir\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir.png\" data-orig-size=\"631,295\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"16-dir\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir-300x140.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir-600x281.png\" class=\"aligncenter size-large wp-image-22754\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir-600x281.png\" alt=\"\" width=\"600\" height=\"281\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir-600x281.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir-300x140.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir-630x295.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/16-dir.png 631w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Note that the size of the file at this point is 0 bytes.<\/p>\n<p>Then the file is copied over:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22755\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/18-dir\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/18-dir.png\" data-orig-size=\"805,79\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"18-dir\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/18-dir-300x29.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/18-dir-600x59.png\" class=\"aligncenter size-large wp-image-22755\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/18-dir-600x59.png\" alt=\"\" width=\"600\" height=\"59\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/18-dir-600x59.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/18-dir-300x29.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/18-dir.png 805w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Now you can see that the file has been copied over and the size is 46080 bytes:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22756\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/17-dir\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/17-dir.png\" data-orig-size=\"628,247\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"17-dir\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/17-dir-300x118.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/17-dir-600x236.png\" class=\"aligncenter size-large wp-image-22756\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/17-dir-600x236.png\" alt=\"\" width=\"600\" height=\"236\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/17-dir-600x236.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/17-dir-300x118.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/17-dir.png 628w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Now the process will be launched from this location.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22757\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/19-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/19-bin.png\" data-orig-size=\"811,271\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"19-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/19-bin-300x100.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/19-bin-600x200.png\" class=\"aligncenter size-large wp-image-22757\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/19-bin-600x200.png\" alt=\"\" width=\"600\" height=\"200\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/19-bin-600x200.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/19-bin-300x100.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/19-bin.png 811w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>You can modify it if you want:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22758\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/20-modify\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/20-modify.png\" data-orig-size=\"320,215\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"20-modify\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/20-modify-300x202.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/20-modify.png\" class=\"aligncenter size-full wp-image-22758\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/20-modify.png\" alt=\"\" width=\"320\" height=\"215\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/20-modify.png 320w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/20-modify-300x202.png 300w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22759\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/21-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin.png\" data-orig-size=\"812,40\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"21-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin-300x15.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin-600x30.png\" class=\"aligncenter size-large wp-image-22759\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin-600x30.png\" alt=\"\" width=\"600\" height=\"30\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin-600x30.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin-300x15.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin-767x40.png 767w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/21-bin.png 812w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Once the process has been successfully launched, we want to look at the next important step. It will call the WININET dll to start establishing a connection back to the admin.<\/p>\n<p>After execution, it will try to connect out to its admin server:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22760\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/22-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin.png\" data-orig-size=\"808,25\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"22-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin-300x9.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin-600x19.png\" class=\"aligncenter size-large wp-image-22760\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin-600x19.png\" alt=\"\" width=\"600\" height=\"19\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin-600x19.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin-300x9.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin-767x25.png 767w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/22-bin.png 808w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>And here is the connection:<\/p>\n<p><strong>TCP\u00a0\u00a0\u00a0 localhost:49690\u00a0\u00a0\u00a0 49.51.228.205:http\u00a0\u00a0\u00a0 ESTABLISHED\u00a0<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22761\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/23-connection\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/23-connection.png\" data-orig-size=\"320,92\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"23-connection\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/23-connection-300x86.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/23-connection.png\" class=\"aligncenter size-full wp-image-22761\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/23-connection.png\" alt=\"\" width=\"320\" height=\"92\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/23-connection.png 320w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/23-connection-300x86.png 300w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/p>\n<p>This is the host you can see is loaded into the stack below.<\/p>\n<p>We will now take a deeper look into how that unfolds in the stack.<\/p>\n<p>The first step is to load the WININET DLL. It is called through the LoadLibrary function:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22762\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/24-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/24-bin.png\" data-orig-size=\"808,613\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"24-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/24-bin-300x228.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/24-bin-600x455.png\" class=\"aligncenter size-large wp-image-22762\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/24-bin-600x455.png\" alt=\"\" width=\"600\" height=\"455\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/24-bin-600x455.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/24-bin-300x228.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/24-bin.png 808w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/> And now, let&#8217;s take a look at the functions that are of interest to us (highlighted and commented) in the disassembler. We will dive into a couple of these later:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22763\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/25-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/25-bin.png\" data-orig-size=\"896,594\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"25-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/25-bin-300x199.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/25-bin-600x398.png\" class=\"aligncenter size-large wp-image-22763\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/25-bin-600x398.png\" alt=\"\" width=\"600\" height=\"398\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/25-bin-600x398.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/25-bin-300x199.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/25-bin.png 896w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22764\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/26-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin.png\" data-orig-size=\"918,416\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"26-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin-300x136.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin-600x272.png\" class=\"aligncenter size-large wp-image-22764\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin-600x272.png\" alt=\"\" width=\"600\" height=\"272\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin-600x272.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin-300x136.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin-767x349.png 767w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/26-bin.png 918w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/> Here&#8217;s the stack, where the above functions can be seen in action (variable values added):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22765\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/27-stack\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/27-stack.png\" data-orig-size=\"868,213\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"27-stack\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/27-stack-300x74.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/27-stack-600x147.png\" class=\"aligncenter size-large wp-image-22765\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/27-stack-600x147.png\" alt=\"\" width=\"600\" height=\"147\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/27-stack-600x147.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/27-stack-300x74.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/27-stack.png 868w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>At this point, let&#8217;s move on to the next DLL that is called: WINHTTP.dll.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22766\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/28-stack\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/28-stack.png\" data-orig-size=\"819,80\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"28-stack\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/28-stack-300x29.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/28-stack-600x59.png\" class=\"aligncenter size-large wp-image-22766\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/28-stack-600x59.png\" alt=\"\" width=\"600\" height=\"59\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/28-stack-600x59.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/28-stack-300x29.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/28-stack.png 819w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Now let&#8217;s have a look at the functions that are called from here on:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22767\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/29-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/29-bin.png\" data-orig-size=\"946,487\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"29-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/29-bin-300x154.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/29-bin-600x309.png\" class=\"aligncenter size-large wp-image-22767\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/29-bin-600x309.png\" alt=\"\" width=\"600\" height=\"309\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/29-bin-600x309.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/29-bin-300x154.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/29-bin.png 946w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>As you can see, all of the above functions are &#8220;WinHttp&#8221;.<\/p>\n<p>Let&#8217;s have a look at some of the more interesting functions:<\/p>\n<p><strong><em>WinHttpCreateUrl<\/em><\/strong><\/p>\n<p>This will put together the complete URL for the malware by combining the host and the path. Let\u2019s step into it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22768\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/30-stack\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/30-stack.png\" data-orig-size=\"602,227\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"30-stack\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/30-stack-300x113.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/30-stack-600x226.png\" class=\"aligncenter size-large wp-image-22768\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/30-stack-600x226.png\" alt=\"\" width=\"600\" height=\"226\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/30-stack-600x226.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/30-stack-300x113.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/30-stack.png 602w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/> And here&#8217;s the complete URI with jsproxy.dll being called in for WinInet&#8217;s auto-proxy support:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22769\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/31-stack\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/31-stack.png\" data-orig-size=\"809,72\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"31-stack\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/31-stack-300x27.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/31-stack-600x53.png\" class=\"aligncenter size-large wp-image-22769\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/31-stack-600x53.png\" alt=\"\" width=\"600\" height=\"53\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/31-stack-600x53.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/31-stack-300x27.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/31-stack.png 809w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Finally, we should have a look at the memory dump to see how the URI loaded into the memory:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22770\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/32-dmp\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/32-dmp.png\" data-orig-size=\"686,177\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"32-dmp\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/32-dmp-300x77.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/32-dmp-600x155.png\" class=\"aligncenter size-large wp-image-22770\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/32-dmp-600x155.png\" alt=\"\" width=\"600\" height=\"155\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/32-dmp-600x155.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/32-dmp-300x77.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/32-dmp.png 686w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Have a look at the stack screenshot below. You can see that the URL is loaded onto the stack and ready to be called.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22771\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/33-debug\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug.png\" data-orig-size=\"640,103\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"33-debug\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug-300x48.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug-600x97.png\" class=\"aligncenter size-large wp-image-22771\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug-600x97.png\" alt=\"\" width=\"600\" height=\"97\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug-600x97.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug-300x48.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug-630x103.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/33-debug.png 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>And let\u2019s have a look at the memory in parallel. You can see that the URL has been successfully loaded, and is ready to be called upon, using the URLDownloadToFile call.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22772\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/34-mem\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/34-mem.png\" data-orig-size=\"640,192\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"34-mem\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/34-mem-300x90.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/34-mem-600x180.png\" class=\"aligncenter size-large wp-image-22772\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/34-mem-600x180.png\" alt=\"\" width=\"600\" height=\"180\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/34-mem-600x180.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/34-mem-300x90.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/34-mem.png 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Interesting ASCII strings that you can see in the above screenshot show you how the malware is adding a rule to the firewall, specifying the process and then the direction (out) for the action &#8220;Allow.&#8221; This is to make sure that the outbound request from the malware is allowed and is successful in checking in with the admin.<\/p>\n<p>And here&#8217;s the view from the stack:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22773\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/35-stack\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack.png\" data-orig-size=\"640,42\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"35-stack\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack-300x20.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack-600x39.png\" class=\"aligncenter size-large wp-image-22773\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack-600x39.png\" alt=\"\" width=\"600\" height=\"39\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack-600x39.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack-300x20.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack-630x42.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/35-stack.png 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><br \/> This is what it looks like in the CPU:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22774\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/36-bin\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/36-bin.png\" data-orig-size=\"868,255\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"36-bin\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/36-bin-300x88.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/36-bin-600x176.png\" class=\"aligncenter size-large wp-image-22774\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/36-bin-600x176.png\" alt=\"\" width=\"600\" height=\"176\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/36-bin-600x176.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/36-bin-300x88.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/36-bin.png 868w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The command used is: <strong>netsh. <\/strong><\/p>\n<p>Here\u2019s a view of the process image:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22775\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/37-image\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/37-image.png\" data-orig-size=\"640,127\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"37-image\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/37-image-300x60.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/37-image-600x119.png\" class=\"aligncenter size-large wp-image-22775\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/37-image-600x119.png\" alt=\"\" width=\"600\" height=\"119\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/37-image-600x119.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/37-image-300x60.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/37-image.png 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>And here are the rules created and deployed successfully on the firewall:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22776\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/38-firewall\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall.png\" data-orig-size=\"640,54\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"38-firewall\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall-300x25.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall-600x51.png\" class=\"aligncenter size-large wp-image-22776\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall-600x51.png\" alt=\"\" width=\"600\" height=\"51\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall-600x51.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall-300x25.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall-630x54.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/38-firewall.png 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Some other interesting calls:<\/p>\n<p><strong>Anti-VM<\/strong><\/p>\n<p><code>77028A50 &gt;-FF25 F4030877\u00a0\u00a0\u00a0 JMP DWORD PTR DS:[&lt; &amp;api-ms-win-core-file&gt;; KERNELBA.GetDiskFreeSpaceExA<br \/> 0018F234\u00a0 |7029160E\u00a0 )p\u00a0 ; RETURN from KERNEL32.GetTickCount to WININET.7029160E<\/code><\/p>\n<p><strong>Environment ID<\/strong><\/p>\n<p><code>77028DA0 &gt;-FF25 A8070877\u00a0\u00a0\u00a0 JMP DWORD PTR DS:[&lt;&amp;api-ms-win-core-proc&gt;; KERNELBA.GetEnvironmentStringsA<\/code><\/p>\n<p><strong>Networking<\/strong><\/p>\n<p><code>0018E9B8\u00a0 |7029818C\u00a0; ASCII \"getaddrinfo\"<\/code><\/p>\n<p><em>*\/protocol-independent translation from an ANSI host name to an address<\/em><\/p>\n<p><code>0018E9C0\u00a0 |70298198\u00a0 ; ASCII \"getnameinfo\"<\/code><\/p>\n<p><em>*\/protocol-independent name resolution from an address to an ANSI host name and from a port number to the ANSI service name <\/em><\/p>\n<p><code>0018FB84\u00a0 [70272C72\u00a0; \/RETURN from DNSAPI.DnsGetProxyInformation to WININET.70272C72<br \/> 0018FB88\u00a0\u00a0 0051E4B0\u00a0 \u00b0\u00e4Q\u00a0\u00a0 ; |Arg1 = UNICODE \"wassronledorhad.in\"<\/code><\/p>\n<p><em>*\/returns the proxy information for a DNS server&#8217;s name resolution policy table<\/em><\/p>\n<p>Once the connection has been established with the admin server (C2), the payload is served. The payload is picked by the administrator for each campaign and can be any malware type. In this campaign, it happened to be a backdoor.<\/p>\n<p>The URL for the download of the payload was successfully extracted from memory. We will not be analyzing the payload for the purpose of this exercise, but I have included the details at the end of this post.<strong>\u00a0<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22778\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/attachment\/39-mem\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/39-mem.png\" data-orig-size=\"640,170\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"39-mem\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/39-mem-300x80.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/39-mem-600x159.png\" class=\"aligncenter size-large wp-image-22778\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/39-mem-600x159.png\" alt=\"\" width=\"600\" height=\"159\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/39-mem-600x159.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/39-mem-300x80.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/39-mem.png 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h3>Conclusion<\/h3>\n<p>QuantLoader code has some interesting bits and pieces, like the firewall rules manipulation. It is a fairly straight-forward malware, and does what it has been developed to do. The campaign admins have the ability to change final payloads and run different campaigns using the same downloader.<\/p>\n<p>It has been reported as ransomware, but that seems to be based on a memory-string that has a reference to Locky, which looks like a remnant from an older campaign.<\/p>\n<p>Z:varwww4testfilescryptorsadminLoc2.exe<\/p>\n<p>Also, it is interesting to see it being served over SMB rather than the traditional HTTP protocol.<\/p>\n<h3>Files from the campaign<\/h3>\n<p>JS Downloader:<\/p>\n<p>MD5 &#8211; 6f2b5a20dba3cdc2b10c6a7c56a7bf35<br \/> SHA256 &#8211; db078628cdc41e9519e98b7ea56232085e203491bd2d5d8e49ef6708f129e1b8<\/p>\n<p>https:\/\/www.virustotal.com\/#\/file\/db078628cdc41e9519e98b7ea56232085e203491bd2d5d8e49ef6708f129e1b8\/detection<\/p>\n<p>QuantLoader:<\/p>\n<p>MD5 &#8211; 4394536e9a53b94a2634c68043e76ef8<br \/> SHA256 &#8211; 2b53466eebd2c65f81004c567df9025ce68017241e421abcf33799bd3e827900<\/p>\n<p>https:\/\/www.virustotal.com\/#\/file\/2b53466eebd2c65f81004c567df9025ce68017241e421abcf33799bd3e827900\/detection<\/p>\n<p>Payload Backdoor:<\/p>\n<p>MD5 &#8211; 6c6d772704abf4426c5d7e5a52c847d7<br \/> SHA256 &#8211; \u00a0\u00a0\u00a0 0d100ff26a764c65f283742b9ec9014f4fd64df4f1e586b57f3cdce6eadeedcd<\/p>\n<p>https:\/\/www.virustotal.com\/#\/file\/0d100ff26a764c65f283742b9ec9014f4fd64df4f1e586b57f3cdce6eadeedcd\/detection<\/p>\n<hr \/>\n<p><em>Vishal Thakur has<\/em><span class=\"s1\">\u00a0<em>been working in InfoSec for a number of years, specializing in Incident Response and Malware Analysis. Currently, he&#8217;s working for Salesforce in CSIRT (Computer Security Incident Response Team), and before that was part of the CSIRT for Commonwealth Bank of Australia.\u00a0<\/em><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/\">An in-depth malware analysis of QuantLoader<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 28 Mar 2018 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/' title='An in-depth malware analysis of QuantLoader'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/thumb_320.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>QuantLoader is a Trojan downloader that has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. In this post, we&#8217;ll take a high-level look at the campaign flow, as well as a deep dive into how the malware executes. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/backdoor\/\" rel=\"tag\">backdoor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware-analysis\/\" rel=\"tag\">malware analysis<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/quantloader\/\" rel=\"tag\">QuantLoader<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/quantloader-trojan\/\" rel=\"tag\">QuantLoader Trojan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/' title='An in-depth malware analysis of QuantLoader'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/an-in-depth-malware-analysis-of-quantloader\/\">An in-depth malware analysis of QuantLoader<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10836,3764,16466,17928,17929,10494,10833],"class_list":["post-11877","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-backdoor","tag-malware","tag-malware-analysis","tag-quantloader","tag-quantloader-trojan","tag-threat-analysis","tag-trojan"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11877"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11877\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}