Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    29-03-2022 00:11

General

  • Target

    6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe

  • Size

    603KB

  • MD5

    9a8c7ae7424367b8c24d5d70b9c1c867

  • SHA1

    bc058fd1fc2cdc2522f2f17f980b2201951cb4ec

  • SHA256

    6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

  • SHA512

    3235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Tries to connect to .bazar domain 1 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Unexpected DNS network traffic destination 31 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe
    "C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe N5HD8
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4516
      • C:\Windows\system32\PING.EXE
        ping 8.8.8.8 -n 2
        3⤵
        • Runs ping.exe
        PID:448
      • C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe
        C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe N5HD8
        3⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe HNPI
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:480
          • C:\Windows\system32\PING.EXE
            ping 8.8.8.8 -n 2
            5⤵
            • Runs ping.exe
            PID:4768
          • C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe
            C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe HNPI
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4764
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe XYX1FKJ
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4788
              • C:\Windows\system32\PING.EXE
                ping 8.8.8.8 -n 2
                7⤵
                • Runs ping.exe
                PID:3444
              • C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe
                C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe XYX1FKJ
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4688

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe
    Filesize

    603KB

    MD5

    9a8c7ae7424367b8c24d5d70b9c1c867

    SHA1

    bc058fd1fc2cdc2522f2f17f980b2201951cb4ec

    SHA256

    6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

    SHA512

    3235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb

  • C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe
    Filesize

    603KB

    MD5

    9a8c7ae7424367b8c24d5d70b9c1c867

    SHA1

    bc058fd1fc2cdc2522f2f17f980b2201951cb4ec

    SHA256

    6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

    SHA512

    3235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb

  • C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe
    Filesize

    603KB

    MD5

    9a8c7ae7424367b8c24d5d70b9c1c867

    SHA1

    bc058fd1fc2cdc2522f2f17f980b2201951cb4ec

    SHA256

    6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e

    SHA512

    3235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb

  • memory/448-140-0x0000000000000000-mapping.dmp
  • memory/480-150-0x0000000000000000-mapping.dmp
  • memory/2072-130-0x0000000002150000-0x000000000218D000-memory.dmp
    Filesize

    244KB

  • memory/2072-134-0x00000000023D0000-0x000000000240A000-memory.dmp
    Filesize

    232KB

  • memory/2072-138-0x0000000002110000-0x000000000214B000-memory.dmp
    Filesize

    236KB

  • memory/3444-164-0x0000000000000000-mapping.dmp
  • memory/4516-139-0x0000000000000000-mapping.dmp
  • memory/4688-171-0x00000000022C0000-0x00000000022FA000-memory.dmp
    Filesize

    232KB

  • memory/4688-165-0x0000000000000000-mapping.dmp
  • memory/4764-159-0x00000000021B0000-0x00000000021EA000-memory.dmp
    Filesize

    232KB

  • memory/4764-152-0x0000000000000000-mapping.dmp
  • memory/4768-151-0x0000000000000000-mapping.dmp
  • memory/4788-163-0x0000000000000000-mapping.dmp
  • memory/4916-146-0x00000000022A0000-0x00000000022DA000-memory.dmp
    Filesize

    232KB

  • memory/4916-141-0x0000000000000000-mapping.dmp