Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    01-04-2021 17:44

General

  • Target

    81e6dcf2510ffc2400743e912448013f.exe

  • Size

    316KB

  • MD5

    81e6dcf2510ffc2400743e912448013f

  • SHA1

    b1b29fff6348b805851513ce8812990a2f5a4e39

  • SHA256

    258ad65c676c26e608f331bc538a985fd4ac019c6ca4229e4e197acaa93d82c4

  • SHA512

    f1e8cc52664acb684ab9f06227d28de19629de888fdb73ad42f325199e587388301751cdd8c10680127b5d6a439c98da9a25252951ba6bb26648880714a596bc

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe
    "C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe DZOF6
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4200
      • C:\Windows\system32\PING.EXE
        ping 8.8.7.7 -n 2
        3⤵
        • Runs ping.exe
        PID:4320
      • C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe
        C:\Users\Admin\AppData\Local\Temp\81e6dcf2510ffc2400743e912448013f.exe DZOF6
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\RKC7204.exe DO32
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:880
          • C:\Windows\system32\PING.EXE
            ping 8.8.7.7 -n 2
            5⤵
            • Runs ping.exe
            PID:840
          • C:\Users\Admin\AppData\Local\Temp\RKC7204.exe
            C:\Users\Admin\AppData\Local\Temp\RKC7204.exe DO32
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1128
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c ping 8.8.7.7 -n 2 & start C:\Users\Admin\AppData\Local\Temp\rKC7204.exe JU0NGE
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1316
              • C:\Windows\system32\PING.EXE
                ping 8.8.7.7 -n 2
                7⤵
                • Runs ping.exe
                PID:1544
              • C:\Users\Admin\AppData\Local\Temp\RKC7204.exe
                C:\Users\Admin\AppData\Local\Temp\rKC7204.exe JU0NGE
                7⤵
                • Executes dropped EXE
                PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1608-27-0x0000000001FF0000-0x0000000002013000-memory.dmp

    Filesize

    140KB

  • memory/4768-2-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4768-4-0x00000000001B0000-0x00000000001D2000-memory.dmp

    Filesize

    136KB

  • memory/4768-3-0x0000000000430000-0x0000000000453000-memory.dmp

    Filesize

    140KB