Resubmissions

16-03-2022 10:58

220316-m219ascgd6 10

16-09-2021 14:03

210916-rc1npagdel 10

15-09-2021 23:08

210915-24mw1sbeb5 1

Analysis

  • max time kernel
    481s
  • max time network
    517s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    16-09-2021 14:03

General

  • Target

    DialogGL.EXE

  • Size

    224KB

  • MD5

    3e494cf9a64f6836638f8f99d4015d5b

  • SHA1

    de1d042453c77ba66bb9993c40245fd493fcb679

  • SHA256

    1625a3baefca74d244796f8ba85972350fda0994cf6752ac4d8ea8ff93052f42

  • SHA512

    e2db480175db189de53d35fe6a2318f9ccafec0ca709efa35d38444f52ab1a4db60a7ce9f4414131ee478dd262c50d904eec5eaf6fbd98b2ca2e95c590c89dee

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DialogGL.EXE
    "C:\Users\Admin\AppData\Local\Temp\DialogGL.EXE"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2028
  • C:\Users\Admin\AppData\Local\Temp\DialogGL.EXE
    C:\Users\Admin\AppData\Local\Temp\DialogGL.EXE {BD100145-C8FC-4B71-A3C6-375065B332A4}
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1808

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-72-0x0000000001D80000-0x0000000001D96000-memory.dmp
    Filesize

    88KB

  • memory/2028-60-0x00000000762C1000-0x00000000762C3000-memory.dmp
    Filesize

    8KB

  • memory/2028-61-0x00000000003D0000-0x00000000003E4000-memory.dmp
    Filesize

    80KB

  • memory/2028-64-0x0000000000440000-0x0000000000456000-memory.dmp
    Filesize

    88KB

  • memory/2028-67-0x00000000003B0000-0x00000000003C1000-memory.dmp
    Filesize

    68KB