Analysis
-
max time kernel
92s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 02:40
Behavioral task
behavioral1
Sample
88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe
Resource
win10v2004-20220812-en
General
-
Target
88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe
-
Size
42.5MB
-
MD5
f96ce21f37e356f59df71370cba4b71d
-
SHA1
785b724a8cb34b677b7fb0b9b770b9b27b689538
-
SHA256
88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767
-
SHA512
0aa3107611282198d34ecb9c3a83aa56b0d3bbf92624104195c354864bf3053c7a4f6742df419c69a3cedd3688e9c719fc8bf4bd21bb4e450d8b09967980b330
-
SSDEEP
786432:T/n5lSOGApJPAHuXkw7/UQs2MMNixxG1cghRFbbraU3VvcMzztsIxeGX:bnGgAOXkw22sx8cEFbbGKNzz/wGX
Malware Config
Signatures
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4956-143-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 behavioral2/memory/4956-142-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 behavioral2/memory/4956-161-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 behavioral2/memory/4956-162-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 -
Executes dropped EXE 1 IoCs
Processes:
DiskGenius.exepid process 4956 DiskGenius.exe -
Processes:
resource yara_rule behavioral2/memory/1512-132-0x0000000140000000-0x0000000140061000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe -
Loads dropped DLL 2 IoCs
Processes:
DiskGenius.exepid process 4956 DiskGenius.exe 4956 DiskGenius.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
DiskGenius.exedescription ioc process File opened for modification \??\PhysicalDrive0 DiskGenius.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
DiskGenius.exepid process 4956 DiskGenius.exe 4956 DiskGenius.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
DiskGenius.exepid process 4956 DiskGenius.exe 4956 DiskGenius.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
DiskGenius.exepid process 4956 DiskGenius.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DiskGenius.exepid process 4956 DiskGenius.exe 4956 DiskGenius.exe 4956 DiskGenius.exe 4956 DiskGenius.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exedescription pid process target process PID 1512 wrote to memory of 4956 1512 88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe DiskGenius.exe PID 1512 wrote to memory of 4956 1512 88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe DiskGenius.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe"C:\Users\Admin\AppData\Local\Temp\88a66e7115caa4c1e11822248a64d8a6da70934dafd382627adde693fd918767.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\DiskGenius.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\DiskGenius.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\MSIMG32.dllFilesize
7KB
MD52e111b435e8013f5aba504f903a307cf
SHA1c082e11050a6e4e28c1993a74e64816e71d6fabf
SHA2562f55d527f6d6d41e8efacf926b4d8428abbcfa173861d526d67709bd6c4f78d2
SHA51234790015a1e7572cbba1a04a93427acb5c6ae164c4b81cad2fc355fd47664867eebd26f89f6d20d264461940bd95dec5091dbb1ee7c2362b38a1694b84424759
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\Options.iniFilesize
379B
MD5c5a3694ba3529642c79fe2ccd4f00e32
SHA1d5baf9cd8e5784cc3af58fd7a492e1381ed87514
SHA25660e5f3abfdf3c2f35c0caee2e0d0523191777931f95bed3f994e577950c89d61
SHA5127374a9747278292850f15eb5eae9fc7a198adb9a36eba0fe748cdf9bdd7875745e368c585a7ef3bd641903edd6145c1b42ad158612fe3166802131ba2723a0eb
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\VERSION.dllFilesize
3.8MB
MD516599eb8cab9b4ed39fddba1bd6ca33d
SHA16fd05c3e0a823810a69e8a7d119d4f4e69f9fd8c
SHA25692c122b6e2ce9c6a5a40884d0d999da94c47e7c1b846183c137b3cd77314b647
SHA512ec360831508ea73d977e1fb14c1ea4336d3c4a783eeb94b3be7bb5cfe241a89d349ff856c466da494a942a5616af4b6e48c51d69c8001bdd42e1cb412c6c69bb
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_arabic.langFilesize
304KB
MD536e6bd12713cc7ea2ed619492f3a0b36
SHA14c9c7553e7b0280d4a06080a55b81d562cae967f
SHA25688beb58ebd7ef27916eeff1c4e95886006543a9e1c0b40e3d75a0552a7a5dd4a
SHA512583fdff02d3ecfef6604b8a6f2e60a62d067b7f9d274320e4500019cacc07762b8e606236967ddaad98727731d269b0b9ea4927cbfd412b72817f406ef9b3456
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_dutch.langFilesize
362KB
MD5793d1512888813f57abca0c14d00e008
SHA11c410cd16abc2a30cb9f9d1e76dc5562d09c8249
SHA256d76187550ee2d2b898427e991d170892648abe65b6ce60b413b62b8e87e9b7b7
SHA512e8277e668f565d52de09dc903a917febe792e388d4ab8df84f4a31a92da2c2446838bc4da70c141726cf8d47b4d7cb10ad04f29d4ef1bfb8b175bcfafff5e443
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_french.langFilesize
379KB
MD5db9d40bea550efb174b0b0cde8342f40
SHA12fe99a4bbc23ebbccd7d1fd6db33e769e23f3fa1
SHA256748373d2c75c82b6e00010cef871dfd38095ec721e3551821e5b48180075214f
SHA512e8cfda67138df0c1d56362e55a6a313b7d913d016d431e43bbe6bb1950a14fa9042f277700736be687f6e3ec0ca8bfba869de06038a3fa15527f873f3f049e65
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_german.langFilesize
376KB
MD513ee86273ff93e697d6178e81d459569
SHA1f8f489206a0ece4da3267c7848ee6c0cdd62c261
SHA256c077a071c1d4ed3b62db0776368d3b58f825f7d460e716245770985b20662d32
SHA5129f7319ea9b518249a4281c8bb838892c6877d69269521bfda3aa420d69b5f1966aefca4214723f4c14edbb9e979347b3b0f1081587603214e6c31582ea6bfb8c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_hungarian.langFilesize
347KB
MD520cb6a53db84e79c542af6cc2e4c1637
SHA1b046477c76ae89102a2ebea0dfbfb76731b4cb98
SHA25698a82c56c27ae93243442b9e037d99bd33f1dab9cd85a580274d1a320616f3d4
SHA512c6088adb738964aae91d46b90eb1c056d6df68b60ab52026518787586eec09b23cdff0a90a94e367efbfeaae69b689af29924d711626848d0ab5c7ff649643a4
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_italian.langFilesize
362KB
MD504587c0ff9a63ae631d562b73ec4b3a6
SHA1e31d7b421439d1f7930fe3dc2b02cbe69b0a292d
SHA256fd3619a3ccc1ae396f9da0445b307b25cc0d0c4a063b7c026add7c76cc314179
SHA512c7289975ad24b730c7380e3fa3040dc216d31efccd6719d58937e870ee22221f5546aeca1fa0d256ce5aaadd9047876dad08e9f12fc6fa26dbf77403bc678760
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_japanese.langFilesize
233KB
MD531163ce99a34fa1dd0d533670f1fcf98
SHA1ae4955292d8496fcb22b4e22506b2bbe7370e312
SHA256e381e174a933840ae951970c158b8442be2fc4caa9c9573eb6532440fd3b5930
SHA51235b4282a9fac1f1e1f7c3f50f591c3bbb572685b61b06b00afcafacb6f806a7b89fbb81d6c3fc87c1c73cb3a53bd57a16c6d29e8b5087e84dacf0c543b075a2b
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_korean.langFilesize
233KB
MD52b3a48778aad515d0e0428b0cc2d35ad
SHA1c04361d21cb91db3a8faeeac85947ad0cb853d11
SHA256f92b5b909c3366220eb5847c6535a4b75f9fa51a6a475468058dd08509a01579
SHA512992531c5fc3c28081ac044279b9112f093dda8f4083c1c68b5a5bd9eef6f11d173a4ecb36cff37698b6097f4b8144c205fd62585f90e21b89dac6be8086f25d2
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_polish.langFilesize
356KB
MD5b18e8317c304d45704a2298dcca59e7d
SHA1d127f5daa2a6dd70f7fb0af9c048226f417b452f
SHA256c5bed4b6e4fffb864bc5314f81de1f206eadfcffedc75a0cbf0f07c81047ad3a
SHA512cda33ddd356513b7b3ae37c4483e7ee06005475967e871184079c4ba08430bbdfe0098d09ec476c4d821e7e21fd91b2622587ce70cd33df6048d7997151ca4b6
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_portuguese.langFilesize
358KB
MD5106cfc3c40e4eeca11c4264ec120514f
SHA153a418b2fec3eaa171464beb674e93022c0e62f1
SHA25663029ad335371feefa6f38b35ebeae643efbb369251b9773f212a5b79640507d
SHA5124ed03e90f223b951e08e3ca5d328e35b1421c40946f918274c5589029d3e80dfafc6f432755607ad269322b8ae36bf44bc59206294b647df1276316345c64c86
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_russian.langFilesize
360KB
MD5df313c0cf1629a0b8ef0155d201f1722
SHA14d40f70ee5a40437a22edd29b56e178de42868fa
SHA256a12b3d675f6eff07c4331a8abf9a4cb3c806618c9c3eb4a7dded4ea39c215f80
SHA512baa4d64868e65db30d9f5193ef29eb6ef589a0b3f78d153520c464d8dc1248a1db406ea487f762a8a63f6987d117dc8ddd1e6b0ab9f13fe908848beded2d0704
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\lang\Language_spanish.langFilesize
371KB
MD54366c4286cf305840372aad993c090ca
SHA1cb357756eca8a52d2c67ec5bf5c5de0ceffbdc47
SHA256e1dc3882e7308ba76c9ef2887f7355e1d86dce0f2ae506f2a1c98609a4311a77
SHA512042af06d2c5e79c0b36851b5198cca408ce9cdbc24cbb89898cafa4d09c97b7128f6c0b14419c1570d4af96de358ff4f730c7e238969e8c91cd4abf7dc23db56
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\msimg32.dllFilesize
7KB
MD52e111b435e8013f5aba504f903a307cf
SHA1c082e11050a6e4e28c1993a74e64816e71d6fabf
SHA2562f55d527f6d6d41e8efacf926b4d8428abbcfa173861d526d67709bd6c4f78d2
SHA51234790015a1e7572cbba1a04a93427acb5c6ae164c4b81cad2fc355fd47664867eebd26f89f6d20d264461940bd95dec5091dbb1ee7c2362b38a1694b84424759
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\DiskGenius\version.dllFilesize
3.8MB
MD516599eb8cab9b4ed39fddba1bd6ca33d
SHA16fd05c3e0a823810a69e8a7d119d4f4e69f9fd8c
SHA25692c122b6e2ce9c6a5a40884d0d999da94c47e7c1b846183c137b3cd77314b647
SHA512ec360831508ea73d977e1fb14c1ea4336d3c4a783eeb94b3be7bb5cfe241a89d349ff856c466da494a942a5616af4b6e48c51d69c8001bdd42e1cb412c6c69bb
-
memory/1512-132-0x0000000140000000-0x0000000140061000-memory.dmpFilesize
388KB
-
memory/4956-142-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB
-
memory/4956-140-0x000007FF7D1A0000-0x000007FF7D1A6000-memory.dmpFilesize
24KB
-
memory/4956-141-0x00007FF7CC650000-0x00007FF7CC660000-memory.dmpFilesize
64KB
-
memory/4956-143-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB
-
memory/4956-133-0x0000000000000000-mapping.dmp
-
memory/4956-160-0x000007FF7D1A0000-0x000007FF7D1A6000-memory.dmpFilesize
24KB
-
memory/4956-161-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB
-
memory/4956-162-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB