Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
29-03-2022 00:11
Static task
static1
Behavioral task
behavioral1
Sample
6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe
Resource
win10v2004-en-20220113
General
-
Target
6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe
-
Size
603KB
-
MD5
9a8c7ae7424367b8c24d5d70b9c1c867
-
SHA1
bc058fd1fc2cdc2522f2f17f980b2201951cb4ec
-
SHA256
6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e
-
SHA512
3235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2072-130-0x0000000002150000-0x000000000218D000-memory.dmp BazarLoaderVar1 behavioral2/memory/2072-134-0x00000000023D0000-0x000000000240A000-memory.dmp BazarLoaderVar1 behavioral2/memory/2072-138-0x0000000002110000-0x000000000214B000-memory.dmp BazarLoaderVar1 behavioral2/memory/4916-146-0x00000000022A0000-0x00000000022DA000-memory.dmp BazarLoaderVar1 behavioral2/memory/4764-159-0x00000000021B0000-0x00000000021EA000-memory.dmp BazarLoaderVar1 behavioral2/memory/4688-171-0x00000000022C0000-0x00000000022FA000-memory.dmp BazarLoaderVar1 -
Executes dropped EXE 2 IoCs
Processes:
HN2ACC8.exeHN2ACC8.exepid process 4764 HN2ACC8.exe 4688 HN2ACC8.exe -
Tries to connect to .bazar domain 1 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 71 dcegjldlggjp.bazar -
Unexpected DNS network traffic destination 31 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 77.73.68.161 Destination IP 94.177.171.127 Destination IP 185.164.136.225 Destination IP 69.164.196.21 Destination IP 147.135.185.78 Destination IP 45.32.160.206 Destination IP 172.98.193.42 Destination IP 208.67.220.220 Destination IP 162.248.241.94 Destination IP 163.172.185.51 Destination IP 35.196.105.24 Destination IP 185.121.177.177 Destination IP 142.4.204.111 Destination IP 82.141.39.32 Destination IP 169.239.202.202 Destination IP 63.231.92.27 Destination IP 176.126.70.119 Destination IP 217.12.210.54 Destination IP 167.99.153.82 Destination IP 185.121.177.177 Destination IP 5.135.183.146 Destination IP 5.45.97.127 Destination IP 192.99.85.244 Destination IP 45.63.124.65 Destination IP 96.47.228.108 Destination IP 89.35.39.64 Destination IP 142.4.205.47 Destination IP 139.59.23.241 Destination IP 172.104.136.243 Destination IP 51.255.211.146 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HN2ACC8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\VHVSD9E9P = "cmd.exe /c reg.exe add HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /f /v ZSX7E1UTWM /t REG_SZ /d \"\\\"C:\\Users\\Admin\\AppData\\Local\\Temp\\HN2ACC8.exe\\\" XYX1FKJ\" & start \"H\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\HN2ACC8.exe\" XYX1FKJ" HN2ACC8.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 448 PING.EXE 4768 PING.EXE 3444 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exepid process 2072 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe 2072 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exeHN2ACC8.exeHN2ACC8.exepid process 2072 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe 2072 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe 4916 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe 4916 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe 4764 HN2ACC8.exe 4764 HN2ACC8.exe 4688 HN2ACC8.exe 4688 HN2ACC8.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.execmd.exe6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.execmd.exeHN2ACC8.execmd.exedescription pid process target process PID 2072 wrote to memory of 4516 2072 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe cmd.exe PID 2072 wrote to memory of 4516 2072 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe cmd.exe PID 4516 wrote to memory of 448 4516 cmd.exe PING.EXE PID 4516 wrote to memory of 448 4516 cmd.exe PING.EXE PID 4516 wrote to memory of 4916 4516 cmd.exe 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe PID 4516 wrote to memory of 4916 4516 cmd.exe 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe PID 4916 wrote to memory of 480 4916 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe cmd.exe PID 4916 wrote to memory of 480 4916 6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe cmd.exe PID 480 wrote to memory of 4768 480 cmd.exe PING.EXE PID 480 wrote to memory of 4768 480 cmd.exe PING.EXE PID 480 wrote to memory of 4764 480 cmd.exe HN2ACC8.exe PID 480 wrote to memory of 4764 480 cmd.exe HN2ACC8.exe PID 4764 wrote to memory of 4788 4764 HN2ACC8.exe cmd.exe PID 4764 wrote to memory of 4788 4764 HN2ACC8.exe cmd.exe PID 4788 wrote to memory of 3444 4788 cmd.exe PING.EXE PID 4788 wrote to memory of 3444 4788 cmd.exe PING.EXE PID 4788 wrote to memory of 4688 4788 cmd.exe HN2ACC8.exe PID 4788 wrote to memory of 4688 4788 cmd.exe HN2ACC8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe"C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe N5HD82⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 23⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exeC:\Users\Admin\AppData\Local\Temp\6a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e.exe N5HD83⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe HNPI4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 25⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exeC:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe HNPI5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe XYX1FKJ6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 27⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exeC:\Users\Admin\AppData\Local\Temp\HN2ACC8.exe XYX1FKJ7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exeFilesize
603KB
MD59a8c7ae7424367b8c24d5d70b9c1c867
SHA1bc058fd1fc2cdc2522f2f17f980b2201951cb4ec
SHA2566a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e
SHA5123235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb
-
C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exeFilesize
603KB
MD59a8c7ae7424367b8c24d5d70b9c1c867
SHA1bc058fd1fc2cdc2522f2f17f980b2201951cb4ec
SHA2566a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e
SHA5123235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb
-
C:\Users\Admin\AppData\Local\Temp\HN2ACC8.exeFilesize
603KB
MD59a8c7ae7424367b8c24d5d70b9c1c867
SHA1bc058fd1fc2cdc2522f2f17f980b2201951cb4ec
SHA2566a35b2f502b3479b94ae120b537f36ba6a659d323d19869a690fe78aac2e275e
SHA5123235fd9ad888fbe95ddf6da8d75f0713e1a93b442027abc9f6d83ab9314e7981e699a3e5502568b26e9b403996fa63cee96ab360a1f5a770c1b1f495e5389deb
-
memory/448-140-0x0000000000000000-mapping.dmp
-
memory/480-150-0x0000000000000000-mapping.dmp
-
memory/2072-130-0x0000000002150000-0x000000000218D000-memory.dmpFilesize
244KB
-
memory/2072-134-0x00000000023D0000-0x000000000240A000-memory.dmpFilesize
232KB
-
memory/2072-138-0x0000000002110000-0x000000000214B000-memory.dmpFilesize
236KB
-
memory/3444-164-0x0000000000000000-mapping.dmp
-
memory/4516-139-0x0000000000000000-mapping.dmp
-
memory/4688-171-0x00000000022C0000-0x00000000022FA000-memory.dmpFilesize
232KB
-
memory/4688-165-0x0000000000000000-mapping.dmp
-
memory/4764-159-0x00000000021B0000-0x00000000021EA000-memory.dmpFilesize
232KB
-
memory/4764-152-0x0000000000000000-mapping.dmp
-
memory/4768-151-0x0000000000000000-mapping.dmp
-
memory/4788-163-0x0000000000000000-mapping.dmp
-
memory/4916-146-0x00000000022A0000-0x00000000022DA000-memory.dmpFilesize
232KB
-
memory/4916-141-0x0000000000000000-mapping.dmp