Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
18-11-2021 15:53
Static task
static1
Behavioral task
behavioral1
Sample
f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe
Resource
win10-en-20211104
General
-
Target
f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe
-
Size
1.0MB
-
MD5
4f0ff6002a6883636aace79606463b35
-
SHA1
54b8a004d96418010e2721fbe8bb156464b7da0f
-
SHA256
f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
-
SHA512
5e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9
Malware Config
Extracted
bazarloader
18.188.232.155
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 7 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SMWBD08.exe BazarLoaderVar1 C:\Users\Admin\AppData\Local\Temp\SMWBD08.exe BazarLoaderVar1 \Users\Admin\AppData\Local\Temp\SMWBD08.exe BazarLoaderVar1 C:\Users\Admin\AppData\Local\Temp\SMWBD08.exe BazarLoaderVar1 \Users\Admin\AppData\Local\Temp\SMWBD08.exe BazarLoaderVar1 C:\Users\Admin\AppData\Local\Temp\SMWBD08.exe BazarLoaderVar1 \Users\Admin\AppData\Local\Temp\SMWBD08.exe BazarLoaderVar1 -
Executes dropped EXE 2 IoCs
Processes:
SMWBD08.exeSMWBD08.exepid process 972 SMWBD08.exe 1664 SMWBD08.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.execmd.exepid process 1428 cmd.exe 1428 cmd.exe 964 cmd.exe 964 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SMWBD08.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\FFMQN9YDJTU = "cmd.exe /c reg.exe add HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /f /v BJOLJHRA /t REG_SZ /d \"\\\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SMWBD08.exe\\\" PVJR8\" & start \"H\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\SMWBD08.exe\" PVJR8" SMWBD08.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 636 PING.EXE 1112 PING.EXE 824 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exepid process 592 f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.execmd.exef18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.execmd.exeSMWBD08.execmd.exedescription pid process target process PID 592 wrote to memory of 588 592 f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe cmd.exe PID 592 wrote to memory of 588 592 f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe cmd.exe PID 592 wrote to memory of 588 592 f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe cmd.exe PID 588 wrote to memory of 636 588 cmd.exe PING.EXE PID 588 wrote to memory of 636 588 cmd.exe PING.EXE PID 588 wrote to memory of 636 588 cmd.exe PING.EXE PID 588 wrote to memory of 2020 588 cmd.exe f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe PID 588 wrote to memory of 2020 588 cmd.exe f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe PID 588 wrote to memory of 2020 588 cmd.exe f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe PID 2020 wrote to memory of 1428 2020 f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe cmd.exe PID 2020 wrote to memory of 1428 2020 f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe cmd.exe PID 2020 wrote to memory of 1428 2020 f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe cmd.exe PID 1428 wrote to memory of 1112 1428 cmd.exe PING.EXE PID 1428 wrote to memory of 1112 1428 cmd.exe PING.EXE PID 1428 wrote to memory of 1112 1428 cmd.exe PING.EXE PID 1428 wrote to memory of 972 1428 cmd.exe SMWBD08.exe PID 1428 wrote to memory of 972 1428 cmd.exe SMWBD08.exe PID 1428 wrote to memory of 972 1428 cmd.exe SMWBD08.exe PID 972 wrote to memory of 964 972 SMWBD08.exe cmd.exe PID 972 wrote to memory of 964 972 SMWBD08.exe cmd.exe PID 972 wrote to memory of 964 972 SMWBD08.exe cmd.exe PID 964 wrote to memory of 824 964 cmd.exe PING.EXE PID 964 wrote to memory of 824 964 cmd.exe PING.EXE PID 964 wrote to memory of 824 964 cmd.exe PING.EXE PID 964 wrote to memory of 1664 964 cmd.exe SMWBD08.exe PID 964 wrote to memory of 1664 964 cmd.exe SMWBD08.exe PID 964 wrote to memory of 1664 964 cmd.exe SMWBD08.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe"C:\Users\Admin\AppData\Local\Temp\f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe SBF9WR32⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 23⤵
- Runs ping.exe
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exeC:\Users\Admin\AppData\Local\Temp\f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb.exe SBF9WR33⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\SMWBD08.exe ZYMR1U4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 25⤵
- Runs ping.exe
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\SMWBD08.exeC:\Users\Admin\AppData\Local\Temp\SMWBD08.exe ZYMR1U5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\SMWBD08.exe PVJR86⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 27⤵
- Runs ping.exe
PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\SMWBD08.exeC:\Users\Admin\AppData\Local\Temp\SMWBD08.exe PVJR87⤵
- Executes dropped EXE
PID:1664
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4f0ff6002a6883636aace79606463b35
SHA154b8a004d96418010e2721fbe8bb156464b7da0f
SHA256f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
SHA5125e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9
-
MD5
4f0ff6002a6883636aace79606463b35
SHA154b8a004d96418010e2721fbe8bb156464b7da0f
SHA256f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
SHA5125e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9
-
MD5
4f0ff6002a6883636aace79606463b35
SHA154b8a004d96418010e2721fbe8bb156464b7da0f
SHA256f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
SHA5125e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9
-
MD5
4f0ff6002a6883636aace79606463b35
SHA154b8a004d96418010e2721fbe8bb156464b7da0f
SHA256f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
SHA5125e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9
-
MD5
4f0ff6002a6883636aace79606463b35
SHA154b8a004d96418010e2721fbe8bb156464b7da0f
SHA256f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
SHA5125e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9
-
MD5
4f0ff6002a6883636aace79606463b35
SHA154b8a004d96418010e2721fbe8bb156464b7da0f
SHA256f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
SHA5125e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9
-
MD5
4f0ff6002a6883636aace79606463b35
SHA154b8a004d96418010e2721fbe8bb156464b7da0f
SHA256f18c2a8922bbe7b8f12980a46cc3548e9a0903a7294206eeb2d01f7923cdb8eb
SHA5125e77ecb9fbd0264f02065f84b446284249e61ca941f46de5152fc15552691a587edf04617aa1f3e673fcaeb86d4f26658de16c88a4f2f3949dbf5b7a9a8056e9