63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe
517KB
17-04-2022 10:10
behavioral2
743d977bc5f5fdfe91819c3b9490933c
03142bb3481ba4d7ef874f98b1f7af21be4398db
63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
Extracted
Family | bazarloader |
C2 |
195.123.241.204 89.32.41.191 |
Filter: none
-
Bazar Loader
Description
Detected loader normally used to deploy BazarBackdoor malware.
Tags
-
Bazar/Team9 Loader payload
Reported IOCs
resource yara_rule behavioral2/memory/3580-130-0x0000000002130000-0x000000000217A000-memory.dmp BazarLoaderVar1 behavioral2/memory/3580-134-0x0000000002190000-0x00000000021D7000-memory.dmp BazarLoaderVar1 behavioral2/memory/3580-139-0x0000000000500000-0x0000000000548000-memory.dmp BazarLoaderVar1 behavioral2/memory/4800-147-0x00000000021C0000-0x0000000002207000-memory.dmp BazarLoaderVar1 behavioral2/memory/3680-174-0x0000000002170000-0x00000000021B7000-memory.dmp BazarLoaderVar1 -
Executes dropped EXEGGH516C.exeGGH516C.exe
Reported IOCs
pid process 1992 GGH516C.exe 3680 GGH516C.exe -
Adds Run key to start applicationGGH516C.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\M6BWVBCM8G = "cmd.exe /c reg.exe add HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /f /v Q6SDKNFVE /t REG_SZ /d \"\\\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GGH516C.exe\\\" OEZE\" & start \"H\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\GGH516C.exe\" OEZE" GGH516C.exe -
Runs ping.exePING.EXEPING.EXEPING.EXE
TTPs
Reported IOCs
pid process 3980 PING.EXE 4340 PING.EXE 3484 PING.EXE -
Suspicious behavior: EnumeratesProcesses63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe
Reported IOCs
pid process 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe -
Suspicious use of SetWindowsHookEx63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exeGGH516C.exeGGH516C.exe
Reported IOCs
pid process 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 4800 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe 1992 GGH516C.exe 3680 GGH516C.exe -
Suspicious use of WriteProcessMemory63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.execmd.exe63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.execmd.exeGGH516C.execmd.exe
Reported IOCs
description pid process target process PID 3580 wrote to memory of 4756 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 3580 wrote to memory of 4756 3580 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 4756 wrote to memory of 3980 4756 cmd.exe PING.EXE PID 4756 wrote to memory of 3980 4756 cmd.exe PING.EXE PID 4756 wrote to memory of 4800 4756 cmd.exe 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe PID 4756 wrote to memory of 4800 4756 cmd.exe 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe PID 4800 wrote to memory of 3880 4800 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 4800 wrote to memory of 3880 4800 63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe cmd.exe PID 3880 wrote to memory of 4340 3880 cmd.exe PING.EXE PID 3880 wrote to memory of 4340 3880 cmd.exe PING.EXE PID 3880 wrote to memory of 1992 3880 cmd.exe GGH516C.exe PID 3880 wrote to memory of 1992 3880 cmd.exe GGH516C.exe PID 1992 wrote to memory of 4920 1992 GGH516C.exe cmd.exe PID 1992 wrote to memory of 4920 1992 GGH516C.exe cmd.exe PID 4920 wrote to memory of 3484 4920 cmd.exe PING.EXE PID 4920 wrote to memory of 3484 4920 cmd.exe PING.EXE PID 4920 wrote to memory of 3680 4920 cmd.exe GGH516C.exe PID 4920 wrote to memory of 3680 4920 cmd.exe GGH516C.exe
-
C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe"C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe GPHG62Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 2Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exeC:\Users\Admin\AppData\Local\Temp\63c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7.exe GPHG62Suspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\GGH516C.exe TV25O48Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 2Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exeC:\Users\Admin\AppData\Local\Temp\GGH516C.exe TV25O48Executes dropped EXEAdds Run key to start applicationSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\GGH516C.exe OEZESuspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 8.8.8.8 -n 2Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exeC:\Users\Admin\AppData\Local\Temp\GGH516C.exe OEZEExecutes dropped EXESuspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
C:\Users\Admin\AppData\Local\Temp\GGH516C.exe
MD5743d977bc5f5fdfe91819c3b9490933c
SHA103142bb3481ba4d7ef874f98b1f7af21be4398db
SHA25663c47ac180d0a7c38b005d69afed8758618f2ca023e0c1fd6cc15f5e2886a3c7
SHA512dc2285a388808adfd516f31cc8e8402e66780c6d37df31e099172a3c3a2cb65b898deac8701c5add0cc96f360036b4ee8e4c82b2a42fd5fb45702292986ef14e
-
memory/1992-154-0x0000000000000000-mapping.dmp
-
memory/3484-167-0x0000000000000000-mapping.dmp
-
memory/3580-139-0x0000000000500000-0x0000000000548000-memory.dmp
-
memory/3580-134-0x0000000002190000-0x00000000021D7000-memory.dmp
-
memory/3580-130-0x0000000002130000-0x000000000217A000-memory.dmp
-
memory/3680-168-0x0000000000000000-mapping.dmp
-
memory/3680-174-0x0000000002170000-0x00000000021B7000-memory.dmp
-
memory/3880-152-0x0000000000000000-mapping.dmp
-
memory/3980-141-0x0000000000000000-mapping.dmp
-
memory/4340-153-0x0000000000000000-mapping.dmp
-
memory/4756-140-0x0000000000000000-mapping.dmp
-
memory/4800-147-0x00000000021C0000-0x0000000002207000-memory.dmp
-
memory/4800-142-0x0000000000000000-mapping.dmp
-
memory/4920-166-0x0000000000000000-mapping.dmp