Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
01-04-2021 03:26
Static task
static1
Behavioral task
behavioral1
Sample
2b975f9e33ce44329dbc74941536432a.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2b975f9e33ce44329dbc74941536432a.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
2b975f9e33ce44329dbc74941536432a.exe
-
Size
245KB
-
MD5
2b975f9e33ce44329dbc74941536432a
-
SHA1
22b0cd47fdc5b6b99812779f2d02ccb2ecc46705
-
SHA256
dfbd75635b50926cf864349f436e8baf625881c2fd8cf9267d277d0b11dcc90b
-
SHA512
ea718aa960d35e36345b5750e030fac0e1a91a59e2e7c6373149d0a183bbc41e70244836257b4c4e22f45b509a2f541db80e106568623ae5b9b1cb3186d5a951
Score
10/10
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/528-3-0x0000000180000000-0x0000000180024000-memory.dmp BazarLoaderVar1 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2b975f9e33ce44329dbc74941536432a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\TB6FSHUKP4 = "cmd.exe /c reg.exe add HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /f /v K6WK1WN7P /t REG_SZ /d \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2b975f9e33ce44329dbc74941536432a.exe KPYFB\" & start \"H\" C:\\Users\\Admin\\AppData\\Local\\Temp\\2b975f9e33ce44329dbc74941536432a.exe KPYFB" 2b975f9e33ce44329dbc74941536432a.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 1260 PING.EXE 1708 PING.EXE 1516 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2b975f9e33ce44329dbc74941536432a.exepid process 528 2b975f9e33ce44329dbc74941536432a.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
2b975f9e33ce44329dbc74941536432a.execmd.exe2b975f9e33ce44329dbc74941536432a.execmd.exe2b975f9e33ce44329dbc74941536432a.execmd.exedescription pid process target process PID 528 wrote to memory of 1296 528 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 528 wrote to memory of 1296 528 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 528 wrote to memory of 1296 528 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 1296 wrote to memory of 1260 1296 cmd.exe PING.EXE PID 1296 wrote to memory of 1260 1296 cmd.exe PING.EXE PID 1296 wrote to memory of 1260 1296 cmd.exe PING.EXE PID 1296 wrote to memory of 1268 1296 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 1296 wrote to memory of 1268 1296 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 1296 wrote to memory of 1268 1296 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 1268 wrote to memory of 480 1268 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 1268 wrote to memory of 480 1268 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 1268 wrote to memory of 480 1268 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 480 wrote to memory of 1708 480 cmd.exe PING.EXE PID 480 wrote to memory of 1708 480 cmd.exe PING.EXE PID 480 wrote to memory of 1708 480 cmd.exe PING.EXE PID 480 wrote to memory of 924 480 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 480 wrote to memory of 924 480 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 480 wrote to memory of 924 480 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 924 wrote to memory of 1064 924 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 924 wrote to memory of 1064 924 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 924 wrote to memory of 1064 924 2b975f9e33ce44329dbc74941536432a.exe cmd.exe PID 1064 wrote to memory of 1516 1064 cmd.exe PING.EXE PID 1064 wrote to memory of 1516 1064 cmd.exe PING.EXE PID 1064 wrote to memory of 1516 1064 cmd.exe PING.EXE PID 1064 wrote to memory of 2008 1064 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 1064 wrote to memory of 2008 1064 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe PID 1064 wrote to memory of 2008 1064 cmd.exe 2b975f9e33ce44329dbc74941536432a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe"C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\system32\cmd.execmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe UNVPQX2⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\PING.EXEping 8.8.7.7 -n 23⤵
- Runs ping.exe
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exeC:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe UNVPQX3⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\cmd.execmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe E6RJ70R4⤵
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\system32\PING.EXEping 8.8.7.7 -n 25⤵
- Runs ping.exe
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exeC:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe E6RJ70R5⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\cmd.execmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe KPYFB6⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\PING.EXEping 8.8.7.7 -n 27⤵
- Runs ping.exe
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exeC:\Users\Admin\AppData\Local\Temp\2b975f9e33ce44329dbc74941536432a.exe KPYFB7⤵PID:2008
-
-
-
-
-
-