Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 09:04
Static task
static1
Behavioral task
behavioral1
Sample
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe
Resource
win10v2004-20220414-en
General
-
Target
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe
-
Size
517KB
-
MD5
743d977bc5f5fdfe91819c3b9490933c
-
SHA1
03142bb3481ba4d7ef874f98b1f7af21be4398db
-
SHA256
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
-
SHA512
dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
Malware Config
Extracted
bazarloader
195.123.241.204
89.32.41.191
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3580-130-0x0000000002130000-0x000000000217A000-memory.dmp BazarLoaderVar1 behavioral2/memory/3580-134-0x0000000002190000-0x00000000021D7000-memory.dmp BazarLoaderVar1 behavioral2/memory/3580-139-0x0000000000500000-0x0000000000548000-memory.dmp BazarLoaderVar1 behavioral2/memory/4800-147-0x00000000021C0000-0x0000000002207000-memory.dmp BazarLoaderVar1 behavioral2/memory/3680-174-0x0000000002170000-0x00000000021B7000-memory.dmp BazarLoaderVar1 -
Executes dropped EXE 2 IoCs
Processes:
GGH516C.exeGGH516C.exepid process 1992 GGH516C.exe 3680 GGH516C.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
GGH516C.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\M6BWVBCM8G = "cmd.exe /c reg.exe add HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /f /v Q6SDKNFVE /t REG_SZ /d \"\\\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GGH516C.exe\\\" OEZE\" & start \"H\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\GGH516C.exe\" OEZE" GGH516C.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 3980 PING.EXE 4340 PING.EXE 3484 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exepid process 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exeGGH516C.exeGGH516C.exepid process 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 4800 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 1992 GGH516C.exe 3680 GGH516C.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.execmd.exe63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.execmd.exeGGH516C.execmd.exedescription pid process target process PID 3580 wrote to memory of 4756 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 3580 wrote to memory of 4756 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 4756 wrote to memory of 3980 4756 cmd.exe PING.EXE PID 4756 wrote to memory of 3980 4756 cmd.exe PING.EXE PID 4756 wrote to memory of 4800 4756 cmd.exe 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe PID 4756 wrote to memory of 4800 4756 cmd.exe 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe PID 4800 wrote to memory of 3880 4800 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 4800 wrote to memory of 3880 4800 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 3880 wrote to memory of 4340 3880 cmd.exe PING.EXE PID 3880 wrote to memory of 4340 3880 cmd.exe PING.EXE PID 3880 wrote to memory of 1992 3880 cmd.exe GGH516C.exe PID 3880 wrote to memory of 1992 3880 cmd.exe GGH516C.exe PID 1992 wrote to memory of 4920 1992 GGH516C.exe cmd.exe PID 1992 wrote to memory of 4920 1992 GGH516C.exe cmd.exe PID 4920 wrote to memory of 3484 4920 cmd.exe PING.EXE PID 4920 wrote to memory of 3484 4920 cmd.exe PING.EXE PID 4920 wrote to memory of 3680 4920 cmd.exe GGH516C.exe PID 4920 wrote to memory of 3680 4920 cmd.exe GGH516C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe"C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe GPHG622⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 23⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exeC:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe GPHG623⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\GGH516C.exe TV25O484⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 25⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exeC:\Users\Admin\AppData\Local\Temp\GGH516C.exe TV25O485⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\GGH516C.exe OEZE6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 27⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exeC:\Users\Admin\AppData\Local\Temp\GGH516C.exe OEZE7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exeFilesize
517KB
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exeFilesize
517KB
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exeFilesize
517KB
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
memory/1992-154-0x0000000000000000-mapping.dmp
-
memory/3484-167-0x0000000000000000-mapping.dmp
-
memory/3580-134-0x0000000002190000-0x00000000021D7000-memory.dmpFilesize
284KB
-
memory/3580-139-0x0000000000500000-0x0000000000548000-memory.dmpFilesize
288KB
-
memory/3580-130-0x0000000002130000-0x000000000217A000-memory.dmpFilesize
296KB
-
memory/3680-174-0x0000000002170000-0x00000000021B7000-memory.dmpFilesize
284KB
-
memory/3680-168-0x0000000000000000-mapping.dmp
-
memory/3880-152-0x0000000000000000-mapping.dmp
-
memory/3980-141-0x0000000000000000-mapping.dmp
-
memory/4340-153-0x0000000000000000-mapping.dmp
-
memory/4756-140-0x0000000000000000-mapping.dmp
-
memory/4800-147-0x00000000021C0000-0x0000000002207000-memory.dmpFilesize
284KB
-
memory/4800-142-0x0000000000000000-mapping.dmp
-
memory/4920-166-0x0000000000000000-mapping.dmp