Analysis

  • max time kernel
    139s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    01-04-2021 17:44

General

  • Target

    81e6dcf2510ffc2400743e912448013f.exe

  • Size

    316KB

  • MD5

    81e6dcf2510ffc2400743e912448013f

  • SHA1

    b1b29fff6348b805851513ce8812990a2f5a4e39

  • SHA256

    258ad65c676c26e608f331bc538a985fd4ac019c6ca4229e4e197acaa93d82c4

  • SHA512

    f1e8cc52664acb684ab9f06227d28de19629de888fdb73ad42f325199e587388301751cdd8c10680127b5d6a439c98da9a25252951ba6bb26648880714a596bc

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe
    "C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\system32\cmd.exe
      cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe QB2KET
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\system32\PING.EXE
        ping 8.8.7.7 -n 2
        3⤵
        • Runs ping.exe
        PID:1348
      • C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe
        C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe QB2KET
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:428
        • C:\Windows\system32\cmd.exe
          cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe MEW1DLD
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:668
          • C:\Windows\system32\PING.EXE
            ping 8.8.7.7 -n 2
            5⤵
            • Runs ping.exe
            PID:1512
          • C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe
            C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe MEW1DLD
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1676
            • C:\Windows\system32\cmd.exe
              cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\cPP16EA.exe O3PAB
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:720
              • C:\Windows\system32\PING.EXE
                ping 8.8.7.7 -n 2
                7⤵
                • Runs ping.exe
                PID:672
              • C:\Users\Admin\AppData\Local\Temp\CPP16EA.exe
                C:\Users\Admin\AppData\Local\Temp\cPP16EA.exe O3PAB
                7⤵
                • Executes dropped EXE
                PID:1064

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/428-10-0x0000000000470000-0x0000000000493000-memory.dmp

    Filesize

    140KB

  • memory/776-3-0x0000000001CA0000-0x0000000001CC3000-memory.dmp

    Filesize

    140KB

  • memory/776-2-0x0000000001C70000-0x0000000001C95000-memory.dmp

    Filesize

    148KB

  • memory/776-4-0x0000000000300000-0x0000000000322000-memory.dmp

    Filesize

    136KB

  • memory/1064-28-0x00000000004E0000-0x0000000000503000-memory.dmp

    Filesize

    140KB

  • memory/1676-19-0x0000000000450000-0x0000000000473000-memory.dmp

    Filesize

    140KB