New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: Azure Arc Privilege Escalation & Identity Takeover
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Control Panel Executable Abused For QakBot Infection

November 21, 2022

QakBot campaign modifies deployment tactics and aims to exploit a DLL hijacking technique that abuses the Windows 10, or later, control panel executable file. The malware arrives via phishing campaign with an HTML attachment, once executed the attachment presents the recipient with a fake Google Drive page that auto downloads a password protected archive file and kindly displays the password for the archive. The archive contains four files which are used to launch the Control panel, side load the QakBot loader and finally infect the system with the QakBot malware. Post infection QakBot will run in the background and obtain other payloads such as Brute Ratel and Cobalt Strike when instructed by the C2.