Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    14-07-2020 16:10

General

  • Target

    DocumentPreview.exe

  • Size

    302KB

  • MD5

    7436b02a8347ca737c0dcefc3cb9eb39

  • SHA1

    1633ce9565cb4a858a01a7ee2349a2ba9e62bee2

  • SHA256

    030b3d2ebc2b5219e2f616396539999621381bcd7af0b5c3d94059c08b8d57b5

  • SHA512

    ce01339bc698c8afc9c828d5f64365ef26b82b8aac9b538283d50e16ce7ae37e7457d3487b35c284b2c14c31a87fc86f3a5ad57eafcd474ddbbd45d4d4ed3244

Malware Config

Signatures

  • Bazar Loader 13 IoCs

    Detected loader normally used to deploy BazarBackdoor malware.

  • Executes dropped EXE 1 IoCs
  • Tries to connect to .bazar domain 12 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DocumentPreview.exe
    "C:\Users\Admin\AppData\Local\Temp\DocumentPreview.exe"
    1⤵
    • Bazar Loader
    PID:1508
  • C:\Windows\system32\cmd.exe
    cmd.exe / c "start "" /b "cmd.exe" /c "copy /y "C:\Users\Admin\AppData\Local\Temp\DocumentPreview.exe" "C:\Users\Admin\AppData\Local\Temp\kfusadqe.exe"&&start "" /b "C:\Users\Admin\AppData\Local\Temp\kfusadqe.exe" -z {3B0C56AA-928A-414D-B82D-5FB923B4D898}&&exit 0""
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\Temp\kfusadqe.exe
      "C:\Users\Admin\AppData\Local\Temp\kfusadqe.exe" -z {3B0C56AA-928A-414D-B82D-5FB923B4D898}
      2⤵
      • Executes dropped EXE
      PID:1544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kfusadqe.exe

    MD5

    7436b02a8347ca737c0dcefc3cb9eb39

    SHA1

    1633ce9565cb4a858a01a7ee2349a2ba9e62bee2

    SHA256

    030b3d2ebc2b5219e2f616396539999621381bcd7af0b5c3d94059c08b8d57b5

    SHA512

    ce01339bc698c8afc9c828d5f64365ef26b82b8aac9b538283d50e16ce7ae37e7457d3487b35c284b2c14c31a87fc86f3a5ad57eafcd474ddbbd45d4d4ed3244

  • \Users\Admin\AppData\Local\Temp\kfusadqe.exe

    MD5

    7436b02a8347ca737c0dcefc3cb9eb39

    SHA1

    1633ce9565cb4a858a01a7ee2349a2ba9e62bee2

    SHA256

    030b3d2ebc2b5219e2f616396539999621381bcd7af0b5c3d94059c08b8d57b5

    SHA512

    ce01339bc698c8afc9c828d5f64365ef26b82b8aac9b538283d50e16ce7ae37e7457d3487b35c284b2c14c31a87fc86f3a5ad57eafcd474ddbbd45d4d4ed3244

  • memory/1508-0-0x0000000000120000-0x0000000000146000-memory.dmp

    Filesize

    152KB

  • memory/1508-1-0x0000000180000000-0x000000018002A000-memory.dmp

    Filesize

    168KB

  • memory/1544-3-0x0000000000000000-mapping.dmp

  • memory/1544-4-0x0000000000000000-mapping.dmp