A new Qakbot malware campaign dubbed “QakNote” has been observed in the wild over the course of the last week and uses Microsoft OneNote attachments to infect systems. In this new campaign, the attackers utilize OneNote files that contain an embedded HTA file attachment that then retrieves the QakBot payload. A script in the HTA file uses curl.exe to download the payload (a DLL) to the C:\ProgramData directory where it is then executed using rundll32.exe. The payload then injects itself into AtBroker.exe to evade detection. The QakBot operators employ two distribution methods for these HTA files:
- Email with an embedded link to the weaponized ONE file
- Thread injections
The latter technique is where the QBot operators hijack existing email threads and send a “reply-to-all” message to its participants with a malicious OneNote Notebook file as the attachment.
QakBot is a relatively well-known malware that specializes in gaining initial access, allowing for the loading of additional malware as well as data stealing and ransomware capabilities. The shift in the malware’s distribution follows the announcement from Microsoft in July where they disabled macros in Office documents by default. As of late, malicious OneNote attachments have been seen used in a large number of campaigns.