Analysis
-
max time kernel
79s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 05:29
Behavioral task
behavioral1
Sample
cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe
Resource
win10v2004-20220812-en
General
-
Target
cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe
-
Size
43.6MB
-
MD5
5db9b584c3fceaaf17467727ea35a972
-
SHA1
9e95d8d396921f03853c4a550111d5e20a9b99c0
-
SHA256
cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b
-
SHA512
d02e0ba321965cb9c1667677758aad8ed1c7f2ef6c682ad60a795f0050c40b265754065d59c85b08baa68e060c49ecc2535e2e81a8b562848337b3269fab792a
-
SSDEEP
786432:Kx+p5kDn/qyNvZBB3kGBADni0M7DtuephMHr4zEh2lpDLqW8LpdL:Kx+p56RNxBBeDC78e0Hr4oAjqW8Lp9
Malware Config
Signatures
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1672-67-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 behavioral1/memory/1672-75-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 behavioral1/memory/1672-76-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 -
Executes dropped EXE 2 IoCs
Processes:
DiskGenius.exepid process 1672 DiskGenius.exe 1416 -
Processes:
resource yara_rule behavioral1/memory/1076-55-0x0000000140000000-0x0000000140061000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exeDiskGenius.exepid process 1076 cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe 1672 DiskGenius.exe 1672 DiskGenius.exe 1416 -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
DiskGenius.exedescription ioc process File opened for modification \??\PhysicalDrive0 DiskGenius.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
DiskGenius.exepid process 1672 DiskGenius.exe 1672 DiskGenius.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
DiskGenius.exepid process 1672 DiskGenius.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
DiskGenius.exepid process 1672 DiskGenius.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DiskGenius.exepid process 1672 DiskGenius.exe 1672 DiskGenius.exe 1672 DiskGenius.exe 1672 DiskGenius.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exedescription pid process target process PID 1076 wrote to memory of 1672 1076 cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe DiskGenius.exe PID 1076 wrote to memory of 1672 1076 cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe DiskGenius.exe PID 1076 wrote to memory of 1672 1076 cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe DiskGenius.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe"C:\Users\Admin\AppData\Local\Temp\cb4f741e2e9df6f7c011e48bd33bf3da3ddd6b091bc9ffe1b0420f0f3a39345b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\MSIMG32.dllFilesize
7KB
MD52e111b435e8013f5aba504f903a307cf
SHA1c082e11050a6e4e28c1993a74e64816e71d6fabf
SHA2562f55d527f6d6d41e8efacf926b4d8428abbcfa173861d526d67709bd6c4f78d2
SHA51234790015a1e7572cbba1a04a93427acb5c6ae164c4b81cad2fc355fd47664867eebd26f89f6d20d264461940bd95dec5091dbb1ee7c2362b38a1694b84424759
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Options.iniFilesize
379B
MD5c5a3694ba3529642c79fe2ccd4f00e32
SHA1d5baf9cd8e5784cc3af58fd7a492e1381ed87514
SHA25660e5f3abfdf3c2f35c0caee2e0d0523191777931f95bed3f994e577950c89d61
SHA5127374a9747278292850f15eb5eae9fc7a198adb9a36eba0fe748cdf9bdd7875745e368c585a7ef3bd641903edd6145c1b42ad158612fe3166802131ba2723a0eb
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\VERSION.dllFilesize
3.8MB
MD516599eb8cab9b4ed39fddba1bd6ca33d
SHA16fd05c3e0a823810a69e8a7d119d4f4e69f9fd8c
SHA25692c122b6e2ce9c6a5a40884d0d999da94c47e7c1b846183c137b3cd77314b647
SHA512ec360831508ea73d977e1fb14c1ea4336d3c4a783eeb94b3be7bb5cfe241a89d349ff856c466da494a942a5616af4b6e48c51d69c8001bdd42e1cb412c6c69bb
-
\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
\Users\Admin\AppData\Local\Temp\7ZipSfx.000\msimg32.dllFilesize
7KB
MD52e111b435e8013f5aba504f903a307cf
SHA1c082e11050a6e4e28c1993a74e64816e71d6fabf
SHA2562f55d527f6d6d41e8efacf926b4d8428abbcfa173861d526d67709bd6c4f78d2
SHA51234790015a1e7572cbba1a04a93427acb5c6ae164c4b81cad2fc355fd47664867eebd26f89f6d20d264461940bd95dec5091dbb1ee7c2362b38a1694b84424759
-
\Users\Admin\AppData\Local\Temp\7ZipSfx.000\version.dllFilesize
3.8MB
MD516599eb8cab9b4ed39fddba1bd6ca33d
SHA16fd05c3e0a823810a69e8a7d119d4f4e69f9fd8c
SHA25692c122b6e2ce9c6a5a40884d0d999da94c47e7c1b846183c137b3cd77314b647
SHA512ec360831508ea73d977e1fb14c1ea4336d3c4a783eeb94b3be7bb5cfe241a89d349ff856c466da494a942a5616af4b6e48c51d69c8001bdd42e1cb412c6c69bb
-
memory/1076-54-0x000007FEFC431000-0x000007FEFC433000-memory.dmpFilesize
8KB
-
memory/1076-55-0x0000000140000000-0x0000000140061000-memory.dmpFilesize
388KB
-
memory/1672-64-0x000007FF7D1A0000-0x000007FF7D1A6000-memory.dmpFilesize
24KB
-
memory/1672-66-0x0000000037A40000-0x0000000037A50000-memory.dmpFilesize
64KB
-
memory/1672-67-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB
-
memory/1672-57-0x0000000000000000-mapping.dmp
-
memory/1672-74-0x000007FF7D1A0000-0x000007FF7D1A6000-memory.dmpFilesize
24KB
-
memory/1672-75-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB
-
memory/1672-76-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB