63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe
517KB
17-04-2022 10:11
behavioral1
743d977bc5f5fdfe91819c3b9490933c
03142bb3481ba4d7ef874f98b1f7af21be4398db
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
Extracted
Family | bazarloader |
C2 |
195.123.241.204 89.32.41.191 |
Filter: none
-
Bazar Loader
Description
Detected loader normally used to deploy BazarBackdoor malware.
Tags
-
Bazar/Team9 Loader payload
Reported IOCs
resource yara_rule behavioral1/memory/1828-54-0x0000000001BC0000-0x0000000001C0A000-memory.dmp BazarLoaderVar1 behavioral1/memory/1828-58-0x0000000001C10000-0x0000000001C57000-memory.dmp BazarLoaderVar1 behavioral1/memory/1828-63-0x0000000000220000-0x0000000000268000-memory.dmp BazarLoaderVar1 behavioral1/memory/1776-71-0x0000000001FE0000-0x0000000002027000-memory.dmp BazarLoaderVar1 behavioral1/memory/1608-86-0x0000000002030000-0x0000000002077000-memory.dmp BazarLoaderVar1 behavioral1/memory/1000-100-0x0000000001F70000-0x0000000001FB7000-memory.dmp BazarLoaderVar1 -
Executes dropped EXEQSZ8161.exeQSZ8161.exe
Reported IOCs
pid process 1608 QSZ8161.exe 1000 QSZ8161.exe -
Loads dropped DLLcmd.execmd.exe
Reported IOCs
pid process 1008 cmd.exe 1948 cmd.exe -
Adds Run key to start applicationQSZ8161.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\YAXELDOB = "cmd.exe /c reg.exe add HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /f /v KT7FH3YXCRB /t REG_SZ /d \"\\\"C:\\Users\\Admin\\AppData\\Local\\Temp\\QSZ8161.exe\\\" KRTV5G\" & start \"H\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\QSZ8161.exe\" KRTV5G" QSZ8161.exe -
Runs ping.exePING.EXEPING.EXEPING.EXE
TTPs
Reported IOCs
pid process 676 PING.EXE 2036 PING.EXE 864 PING.EXE -
Suspicious behavior: EnumeratesProcesses63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe
Reported IOCs
pid process 1828 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe -
Suspicious use of SetWindowsHookEx63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exeQSZ8161.exeQSZ8161.exe
Reported IOCs
pid process 1828 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 1776 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 1608 QSZ8161.exe 1000 QSZ8161.exe -
Suspicious use of WriteProcessMemory63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.execmd.exe63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.execmd.exeQSZ8161.execmd.exe
Reported IOCs
description pid process target process PID 1828 wrote to memory of 1420 1828 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 1828 wrote to memory of 1420 1828 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 1828 wrote to memory of 1420 1828 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 1420 wrote to memory of 2036 1420 cmd.exe PING.EXE PID 1420 wrote to memory of 2036 1420 cmd.exe PING.EXE PID 1420 wrote to memory of 2036 1420 cmd.exe PING.EXE PID 1420 wrote to memory of 1776 1420 cmd.exe 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe PID 1420 wrote to memory of 1776 1420 cmd.exe 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe PID 1420 wrote to memory of 1776 1420 cmd.exe 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe PID 1776 wrote to memory of 1008 1776 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 1776 wrote to memory of 1008 1776 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 1776 wrote to memory of 1008 1776 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 1008 wrote to memory of 864 1008 cmd.exe PING.EXE PID 1008 wrote to memory of 864 1008 cmd.exe PING.EXE PID 1008 wrote to memory of 864 1008 cmd.exe PING.EXE PID 1008 wrote to memory of 1608 1008 cmd.exe QSZ8161.exe PID 1008 wrote to memory of 1608 1008 cmd.exe QSZ8161.exe PID 1008 wrote to memory of 1608 1008 cmd.exe QSZ8161.exe PID 1608 wrote to memory of 1948 1608 QSZ8161.exe cmd.exe PID 1608 wrote to memory of 1948 1608 QSZ8161.exe cmd.exe PID 1608 wrote to memory of 1948 1608 QSZ8161.exe cmd.exe PID 1948 wrote to memory of 676 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 676 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 676 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 1000 1948 cmd.exe QSZ8161.exe PID 1948 wrote to memory of 1000 1948 cmd.exe QSZ8161.exe PID 1948 wrote to memory of 1000 1948 cmd.exe QSZ8161.exe
-
C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe"C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe G3TUSuspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 2Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exeC:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe G3TUSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\QSZ8161.exe U2OGFLoads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 2Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\QSZ8161.exeC:\Users\Admin\AppData\Local\Temp\QSZ8161.exe U2OGFExecutes dropped EXEAdds Run key to start applicationSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\QSZ8161.exe KRTV5GLoads dropped DLLSuspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 2Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\QSZ8161.exeC:\Users\Admin\AppData\Local\Temp\QSZ8161.exe KRTV5GExecutes dropped EXESuspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\QSZ8161.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
C:\Users\Admin\AppData\Local\Temp\QSZ8161.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
C:\Users\Admin\AppData\Local\Temp\QSZ8161.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
\Users\Admin\AppData\Local\Temp\QSZ8161.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
\Users\Admin\AppData\Local\Temp\QSZ8161.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
memory/676-92-0x0000000000000000-mapping.dmp
-
memory/864-77-0x0000000000000000-mapping.dmp
-
memory/1000-94-0x0000000000000000-mapping.dmp
-
memory/1000-100-0x0000000001F70000-0x0000000001FB7000-memory.dmp
-
memory/1008-76-0x0000000000000000-mapping.dmp
-
memory/1420-64-0x0000000000000000-mapping.dmp
-
memory/1608-79-0x0000000000000000-mapping.dmp
-
memory/1608-86-0x0000000002030000-0x0000000002077000-memory.dmp
-
memory/1776-66-0x0000000000000000-mapping.dmp
-
memory/1776-71-0x0000000001FE0000-0x0000000002027000-memory.dmp
-
memory/1828-63-0x0000000000220000-0x0000000000268000-memory.dmp
-
memory/1828-58-0x0000000001C10000-0x0000000001C57000-memory.dmp
-
memory/1828-54-0x0000000001BC0000-0x0000000001C0A000-memory.dmp
-
memory/1948-91-0x0000000000000000-mapping.dmp
-
memory/2036-65-0x0000000000000000-mapping.dmp