Analysis

  • max time kernel
    139s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    01-04-2021 17:44

General

  • Target

    81e6dcf2510ffc2400743e912448013f.exe

  • Size

    316KB

  • MD5

    81e6dcf2510ffc2400743e912448013f

  • SHA1

    b1b29fff6348b805851513ce8812990a2f5a4e39

  • SHA256

    258ad65c676c26e608f331bc538a985fd4ac019c6ca4229e4e197acaa93d82c4

  • SHA512

    f1e8cc52664acb684ab9f06227d28de19629de888fdb73ad42f325199e587388301751cdd8c10680127b5d6a439c98da9a25252951ba6bb26648880714a596bc

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe
    "C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\system32\cmd.exe
      cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe QB2KET
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\system32\PING.EXE
        ping 8.8.7.7 -n 2
        3⤵
        • Runs ping.exe
        PID:1348
      • C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe
        C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe QB2KET
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:428
        • C:\Windows\system32\cmd.exe
          cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe MEW1DLD
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:668
          • C:\Windows\system32\PING.EXE
            ping 8.8.7.7 -n 2
            5⤵
            • Runs ping.exe
            PID:1512
          • C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe
            C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe MEW1DLD
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1676
            • C:\Windows\system32\cmd.exe
              cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\cPP16EA.exe O3PAB
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:720
              • C:\Windows\system32\PING.EXE
                ping 8.8.7.7 -n 2
                7⤵
                • Runs ping.exe
                PID:672
              • C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe
                C:\Users\Admin\AppData\Local\Temp\cPP16EA.exe O3PAB
                7⤵
                • Executes dropped EXE
                PID:1064

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe
    MD5

    81e6dcf2510ffc2400743e912448013f

    SHA1

    b1b29fff6348b805851513ce8812990a2f5a4e39

    SHA256

    258ad65c676c26e608f331bc538a985fd4ac019c6ca4229e4e197acaa93d82c4

    SHA512

    f1e8cc52664acb684ab9f06227d28de19629de888fdb73ad42f325199e587388301751cdd8c10680127b5d6a439c98da9a25252951ba6bb26648880714a596bc

  • C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe
    MD5

    81e6dcf2510ffc2400743e912448013f

    SHA1

    b1b29fff6348b805851513ce8812990a2f5a4e39

    SHA256

    258ad65c676c26e608f331bc538a985fd4ac019c6ca4229e4e197acaa93d82c4

    SHA512

    f1e8cc52664acb684ab9f06227d28de19629de888fdb73ad42f325199e587388301751cdd8c10680127b5d6a439c98da9a25252951ba6bb26648880714a596bc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3825035466-2522850611-591511364-1000\0f5007522459c86e95ffcc62f32308f1_fc0e0041-a258-4d5d-ad46-ed56e156a8eb
    MD5

    accc49f7099fd361a77fd25f831c08ae

    SHA1

    e3e96a8a565d1ea8292572847f35337afabd120f

    SHA256

    9c149639a734c90a23abfada4ab7ca3341344771614e5f235d3ed6b42b4066b7

    SHA512

    caef30d885d80a2baf48db2a78f88d27557f1e24033cd5bd9e83bb12bfcd11d0b08ad0c03f6fd682868d3d6a58d751dc2a8d538bee0cdca613ce309242d3a976

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3825035466-2522850611-591511364-1000\0f5007522459c86e95ffcc62f32308f1_fc0e0041-a258-4d5d-ad46-ed56e156a8eb
    MD5

    df9ec0051364274c6dca48f69763a91e

    SHA1

    2f42017aa94a88551973cac5060f5fb7f8b35ae1

    SHA256

    38a3a1b127e58543629dfec638f02e120efd629bde14392795fa542cf2e945a9

    SHA512

    6641a7db43f159a0e7a5a34e0ed83b0f2ead4c5be7f8f3c17d252cd39b005a62ecfe9115b272c1e70cf52cb03b848edd987483eb4ee80b4a1670a5658a81e0d1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3825035466-2522850611-591511364-1000\0f5007522459c86e95ffcc62f32308f1_fc0e0041-a258-4d5d-ad46-ed56e156a8eb
    MD5

    9b06f0f2d50a89364919cd8b0ea6a0d4

    SHA1

    70af8fd71b33a8c87e89b9de16dcf955099debd3

    SHA256

    0c5f5569de1d3420e35dbe629ee55081ad7e2db5455906f49563c1ef5c74559e

    SHA512

    3679db0fbeb701c6b3ab04aa9910d09c2d9bb8410b08870f71e1e873c08b69c4846e041b9ac80ea84f4dbc0f5155f671a8efec39b3224c1e702d8d4e10ad8166

  • \Users\Admin\AppData\Local\Temp\CPP16EA.exe
    MD5

    81e6dcf2510ffc2400743e912448013f

    SHA1

    b1b29fff6348b805851513ce8812990a2f5a4e39

    SHA256

    258ad65c676c26e608f331bc538a985fd4ac019c6ca4229e4e197acaa93d82c4

    SHA512

    f1e8cc52664acb684ab9f06227d28de19629de888fdb73ad42f325199e587388301751cdd8c10680127b5d6a439c98da9a25252951ba6bb26648880714a596bc

  • \Users\Admin\AppData\Local\Temp\CPP16EA.exe
    MD5

    81e6dcf2510ffc2400743e912448013f

    SHA1

    b1b29fff6348b805851513ce8812990a2f5a4e39

    SHA256

    258ad65c676c26e608f331bc538a985fd4ac019c6ca4229e4e197acaa93d82c4

    SHA512

    f1e8cc52664acb684ab9f06227d28de19629de888fdb73ad42f325199e587388301751cdd8c10680127b5d6a439c98da9a25252951ba6bb26648880714a596bc

  • memory/428-7-0x0000000000000000-mapping.dmp
  • memory/428-10-0x0000000000470000-0x0000000000493000-memory.dmp
    Filesize

    140KB

  • memory/668-12-0x0000000000000000-mapping.dmp
  • memory/672-22-0x0000000000000000-mapping.dmp
  • memory/720-21-0x0000000000000000-mapping.dmp
  • memory/776-3-0x0000000001CA0000-0x0000000001CC3000-memory.dmp
    Filesize

    140KB

  • memory/776-2-0x0000000001C70000-0x0000000001C95000-memory.dmp
    Filesize

    148KB

  • memory/776-4-0x0000000000300000-0x0000000000322000-memory.dmp
    Filesize

    136KB

  • memory/896-5-0x0000000000000000-mapping.dmp
  • memory/1064-24-0x0000000000000000-mapping.dmp
  • memory/1064-28-0x00000000004E0000-0x0000000000503000-memory.dmp
    Filesize

    140KB

  • memory/1348-6-0x0000000000000000-mapping.dmp
  • memory/1512-13-0x0000000000000000-mapping.dmp
  • memory/1676-19-0x0000000000450000-0x0000000000473000-memory.dmp
    Filesize

    140KB

  • memory/1676-15-0x0000000000000000-mapping.dmp