Analysis

  • max time kernel
    168s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 15:45

General

  • Target

    f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37.exe

  • Size

    76KB

  • MD5

    5e13bc98285bd873d1053bbcee71f3f6

  • SHA1

    1d3b3a616ceaeed0554ccbd99d9addca97592ab3

  • SHA256

    f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37

  • SHA512

    d9a12c762b053340d1dde88363694d80318c2d2f00492dcc7f0dd0fcee3a54c9324bae02fd282d6914dffcfb9a8aa40d2f0584af2eeaf4252f1e0ead460be04a

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37.exe
    "C:\Users\Admin\AppData\Local\Temp\f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37.exe HQN7PFS
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4260
      • C:\Windows\system32\PING.EXE
        ping 8.8.8.8 -n 2
        3⤵
        • Runs ping.exe
        PID:4408
      • C:\Users\Admin\AppData\Local\Temp\f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37.exe
        C:\Users\Admin\AppData\Local\Temp\f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37.exe HQN7PFS
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe S75RDQ
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1528
          • C:\Windows\system32\PING.EXE
            ping 8.8.8.8 -n 2
            5⤵
            • Runs ping.exe
            PID:1828
          • C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe
            C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe S75RDQ
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4184
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c ping 8.8.8.8 -n 2 & C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe FMGTW
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:444
              • C:\Windows\system32\PING.EXE
                ping 8.8.8.8 -n 2
                7⤵
                • Runs ping.exe
                PID:3148
              • C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe
                C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe FMGTW
                7⤵
                • Executes dropped EXE
                PID:3544

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe
    Filesize

    76KB

    MD5

    5e13bc98285bd873d1053bbcee71f3f6

    SHA1

    1d3b3a616ceaeed0554ccbd99d9addca97592ab3

    SHA256

    f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37

    SHA512

    d9a12c762b053340d1dde88363694d80318c2d2f00492dcc7f0dd0fcee3a54c9324bae02fd282d6914dffcfb9a8aa40d2f0584af2eeaf4252f1e0ead460be04a

  • C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe
    Filesize

    76KB

    MD5

    5e13bc98285bd873d1053bbcee71f3f6

    SHA1

    1d3b3a616ceaeed0554ccbd99d9addca97592ab3

    SHA256

    f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37

    SHA512

    d9a12c762b053340d1dde88363694d80318c2d2f00492dcc7f0dd0fcee3a54c9324bae02fd282d6914dffcfb9a8aa40d2f0584af2eeaf4252f1e0ead460be04a

  • C:\Users\Admin\AppData\Local\Temp\DVTCDCF.exe
    Filesize

    76KB

    MD5

    5e13bc98285bd873d1053bbcee71f3f6

    SHA1

    1d3b3a616ceaeed0554ccbd99d9addca97592ab3

    SHA256

    f138e7c58f0c5fe76fafc30584c4b37a53961be93aa1e1fb611a9ee416eb6a37

    SHA512

    d9a12c762b053340d1dde88363694d80318c2d2f00492dcc7f0dd0fcee3a54c9324bae02fd282d6914dffcfb9a8aa40d2f0584af2eeaf4252f1e0ead460be04a

  • memory/444-138-0x0000000000000000-mapping.dmp
  • memory/1528-133-0x0000000000000000-mapping.dmp
  • memory/1828-134-0x0000000000000000-mapping.dmp
  • memory/3148-139-0x0000000000000000-mapping.dmp
  • memory/3544-140-0x0000000000000000-mapping.dmp
  • memory/4184-135-0x0000000000000000-mapping.dmp
  • memory/4260-130-0x0000000000000000-mapping.dmp
  • memory/4300-132-0x0000000000000000-mapping.dmp
  • memory/4408-131-0x0000000000000000-mapping.dmp