Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    08-07-2020 14:38

General

  • Target

    DocumentPreview.exe

  • Size

    259KB

  • MD5

    343a2579cafed501bcad9ad2ebd010e6

  • SHA1

    2462cbff6243ba3eb179aa4f799d1a6fc41dac18

  • SHA256

    a94591ab207cc7cfb86586e50fa23c74b660bbdeab183360671973f2c63c2fcd

  • SHA512

    7adeb12f79dd63d91c5cc2864fa15ed48605e122a4a968993f95e986d84bf33baf4c02344ce957e25af2ff5270fab6af211b10947f47a6127b445ce8b5474e48

Malware Config

Signatures

  • Bazar Loader 12 IoCs

    Detected loader normally used to deploy BazarBackdoor malware.

  • Executes dropped EXE 1 IoCs
  • Tries to connect to .bazar domain 11 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DocumentPreview.exe
    "C:\Users\Admin\AppData\Local\Temp\DocumentPreview.exe"
    1⤵
    • Bazar Loader
    PID:112
  • C:\Windows\system32\cmd.exe
    cmd.exe / c "start "" /b "cmd.exe" /c "copy /y "C:\Users\Admin\AppData\Local\Temp\DocumentPreview.exe" "C:\Users\Admin\AppData\Local\Temp\byespqnb.exe"&&start "" /b "C:\Users\Admin\AppData\Local\Temp\byespqnb.exe" -z {834E8EE4-0C09-469A-878E-97B1A09282E9}&&exit 0""
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Users\Admin\AppData\Local\Temp\byespqnb.exe
      "C:\Users\Admin\AppData\Local\Temp\byespqnb.exe" -z {834E8EE4-0C09-469A-878E-97B1A09282E9}
      2⤵
      • Executes dropped EXE
      PID:1572

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\byespqnb.exe

    MD5

    343a2579cafed501bcad9ad2ebd010e6

    SHA1

    2462cbff6243ba3eb179aa4f799d1a6fc41dac18

    SHA256

    a94591ab207cc7cfb86586e50fa23c74b660bbdeab183360671973f2c63c2fcd

    SHA512

    7adeb12f79dd63d91c5cc2864fa15ed48605e122a4a968993f95e986d84bf33baf4c02344ce957e25af2ff5270fab6af211b10947f47a6127b445ce8b5474e48

  • \Users\Admin\AppData\Local\Temp\byespqnb.exe

    MD5

    343a2579cafed501bcad9ad2ebd010e6

    SHA1

    2462cbff6243ba3eb179aa4f799d1a6fc41dac18

    SHA256

    a94591ab207cc7cfb86586e50fa23c74b660bbdeab183360671973f2c63c2fcd

    SHA512

    7adeb12f79dd63d91c5cc2864fa15ed48605e122a4a968993f95e986d84bf33baf4c02344ce957e25af2ff5270fab6af211b10947f47a6127b445ce8b5474e48

  • memory/112-0-0x00000000006F0000-0x0000000000711000-memory.dmp

    Filesize

    132KB

  • memory/1572-2-0x0000000000000000-mapping.dmp

  • memory/1572-3-0x0000000000000000-mapping.dmp

  • memory/1572-5-0x00000000000F0000-0x0000000000111000-memory.dmp

    Filesize

    132KB