Analysis
-
max time kernel
202s -
max time network
241s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2022 12:12
Behavioral task
behavioral1
Sample
9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe
Resource
win10v2004-20221111-en
General
-
Target
9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe
-
Size
43.5MB
-
MD5
379eeae351cb074d4500be04d73bd116
-
SHA1
1a7f13231d50e9e5b84bfe582576cdcfe7bceec0
-
SHA256
9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a
-
SHA512
282ea5c03502c2d8ab466d4ee80ef0ed286cd421c14dce00bd9267c6a405c8cbbe02487e20f209ba4852b1e3ddb1963801ad7f9558a7a30a7278722ee338f805
-
SSDEEP
786432:Qn5lSOGApJPAHuXkw7/UQs2MMNixxG1cghRFbbraU3VvcMzztsIxH0:QnGgAOXkw22sx8cEFbbGKNzz/J0
Malware Config
Signatures
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2624-143-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 behavioral2/memory/2624-162-0x0000000140000000-0x000000014402F000-memory.dmp BazarBackdoorVar3 -
Executes dropped EXE 2 IoCs
Processes:
sg.tmpDiskGenius.exepid process 932 sg.tmp 2624 DiskGenius.exe -
Processes:
resource yara_rule behavioral2/memory/4300-133-0x0000000140000000-0x00000001401F4000-memory.dmp upx behavioral2/memory/4300-136-0x0000000140000000-0x00000001401F4000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
DiskGenius.exepid process 2624 DiskGenius.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
DiskGenius.exedescription ioc process File opened for modification \??\PhysicalDrive0 DiskGenius.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
DiskGenius.exepid process 2624 DiskGenius.exe 2624 DiskGenius.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
DiskGenius.exepid process 2624 DiskGenius.exe 2624 DiskGenius.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exesg.tmpdescription pid process Token: SeBackupPrivilege 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: SeRestorePrivilege 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: 33 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: SeIncBasePriorityPrivilege 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: SeCreateGlobalPrivilege 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: 33 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: SeIncBasePriorityPrivilege 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: 33 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: SeIncBasePriorityPrivilege 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: SeRestorePrivilege 932 sg.tmp Token: 35 932 sg.tmp Token: SeSecurityPrivilege 932 sg.tmp Token: SeSecurityPrivilege 932 sg.tmp Token: 33 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe Token: SeIncBasePriorityPrivilege 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DiskGenius.exepid process 2624 DiskGenius.exe 2624 DiskGenius.exe 2624 DiskGenius.exe 2624 DiskGenius.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exedescription pid process target process PID 4300 wrote to memory of 3492 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe cmd.exe PID 4300 wrote to memory of 3492 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe cmd.exe PID 4300 wrote to memory of 932 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe sg.tmp PID 4300 wrote to memory of 932 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe sg.tmp PID 4300 wrote to memory of 2624 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe DiskGenius.exe PID 4300 wrote to memory of 2624 4300 9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe DiskGenius.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe"C:\Users\Admin\AppData\Local\Temp\9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c set2⤵
-
C:\Users\Admin\AppData\Local\Temp\~1692987073956872566~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\9372104ec9a78ada0d13de64f68a55e7b42857bc1da6b778f59071039e1f1b9a.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~111493598103716447"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\DiskGenius.exe"C:\Users\Admin\AppData\Local\Temp\~111493598103716447\DiskGenius.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\DiskGenius.exeFilesize
33.6MB
MD550c1645573e7b9377165d14556db4626
SHA1cb03f8879a256bf6fa76b80d1f45992af342f752
SHA256315a7f7d4d58c2a1de599c7eea624fdf1077d7ae2869220b4a589e2167e120b5
SHA512360246191279a1b875a2afd1a59654a28e2b9dd5b569322d95e5f8839314c4cd837578c450e458a71e6f0e8e7e73575ecafb8a493fc0d50e254fcdcc5f7f2b96
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\MSIMG32.dllFilesize
7KB
MD52e111b435e8013f5aba504f903a307cf
SHA1c082e11050a6e4e28c1993a74e64816e71d6fabf
SHA2562f55d527f6d6d41e8efacf926b4d8428abbcfa173861d526d67709bd6c4f78d2
SHA51234790015a1e7572cbba1a04a93427acb5c6ae164c4b81cad2fc355fd47664867eebd26f89f6d20d264461940bd95dec5091dbb1ee7c2362b38a1694b84424759
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\Options.iniFilesize
822B
MD588f78aff88381486a880cd8438f9ef73
SHA1b35e9bd35e9372c581d91e3d7ee6efb28986d4db
SHA256dbdd621cd8045ae2e6d74fd88f970e6dc0942403c71607b837c314b1b16a8db1
SHA51210e7e07651108f4f55b0af7e2ec28dd2a64abb34e2d62984bf2aad806cc69e1c90384f31386cd3c2d263124eac64e4c2b6079599706028d74423479d4ddd1967
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_Chinese Simplified.langFilesize
196KB
MD5bbde798220757e7b571071f8c0d8aa32
SHA1f9dcd74498d639a48759fb1f75ee370b03cdf83a
SHA2563a72e222efcd3c6915e6ec5812848de54e646f3dbd53d9112303a27863afc941
SHA5124d6c39951b2c2da33e3d608c170045dccb0a648106fc5c5ebe7928870342ff028d7f48a0654ac8846ba5bf4554af3cd64f8ce36aab375193c15e0c1c8143f282
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_arabic.langFilesize
304KB
MD536e6bd12713cc7ea2ed619492f3a0b36
SHA14c9c7553e7b0280d4a06080a55b81d562cae967f
SHA25688beb58ebd7ef27916eeff1c4e95886006543a9e1c0b40e3d75a0552a7a5dd4a
SHA512583fdff02d3ecfef6604b8a6f2e60a62d067b7f9d274320e4500019cacc07762b8e606236967ddaad98727731d269b0b9ea4927cbfd412b72817f406ef9b3456
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_dutch.langFilesize
362KB
MD5793d1512888813f57abca0c14d00e008
SHA11c410cd16abc2a30cb9f9d1e76dc5562d09c8249
SHA256d76187550ee2d2b898427e991d170892648abe65b6ce60b413b62b8e87e9b7b7
SHA512e8277e668f565d52de09dc903a917febe792e388d4ab8df84f4a31a92da2c2446838bc4da70c141726cf8d47b4d7cb10ad04f29d4ef1bfb8b175bcfafff5e443
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_french.langFilesize
379KB
MD5db9d40bea550efb174b0b0cde8342f40
SHA12fe99a4bbc23ebbccd7d1fd6db33e769e23f3fa1
SHA256748373d2c75c82b6e00010cef871dfd38095ec721e3551821e5b48180075214f
SHA512e8cfda67138df0c1d56362e55a6a313b7d913d016d431e43bbe6bb1950a14fa9042f277700736be687f6e3ec0ca8bfba869de06038a3fa15527f873f3f049e65
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_german.langFilesize
376KB
MD513ee86273ff93e697d6178e81d459569
SHA1f8f489206a0ece4da3267c7848ee6c0cdd62c261
SHA256c077a071c1d4ed3b62db0776368d3b58f825f7d460e716245770985b20662d32
SHA5129f7319ea9b518249a4281c8bb838892c6877d69269521bfda3aa420d69b5f1966aefca4214723f4c14edbb9e979347b3b0f1081587603214e6c31582ea6bfb8c
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_hungarian.langFilesize
347KB
MD520cb6a53db84e79c542af6cc2e4c1637
SHA1b046477c76ae89102a2ebea0dfbfb76731b4cb98
SHA25698a82c56c27ae93243442b9e037d99bd33f1dab9cd85a580274d1a320616f3d4
SHA512c6088adb738964aae91d46b90eb1c056d6df68b60ab52026518787586eec09b23cdff0a90a94e367efbfeaae69b689af29924d711626848d0ab5c7ff649643a4
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_italian.langFilesize
362KB
MD504587c0ff9a63ae631d562b73ec4b3a6
SHA1e31d7b421439d1f7930fe3dc2b02cbe69b0a292d
SHA256fd3619a3ccc1ae396f9da0445b307b25cc0d0c4a063b7c026add7c76cc314179
SHA512c7289975ad24b730c7380e3fa3040dc216d31efccd6719d58937e870ee22221f5546aeca1fa0d256ce5aaadd9047876dad08e9f12fc6fa26dbf77403bc678760
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_japanese.langFilesize
233KB
MD531163ce99a34fa1dd0d533670f1fcf98
SHA1ae4955292d8496fcb22b4e22506b2bbe7370e312
SHA256e381e174a933840ae951970c158b8442be2fc4caa9c9573eb6532440fd3b5930
SHA51235b4282a9fac1f1e1f7c3f50f591c3bbb572685b61b06b00afcafacb6f806a7b89fbb81d6c3fc87c1c73cb3a53bd57a16c6d29e8b5087e84dacf0c543b075a2b
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_korean.langFilesize
233KB
MD52b3a48778aad515d0e0428b0cc2d35ad
SHA1c04361d21cb91db3a8faeeac85947ad0cb853d11
SHA256f92b5b909c3366220eb5847c6535a4b75f9fa51a6a475468058dd08509a01579
SHA512992531c5fc3c28081ac044279b9112f093dda8f4083c1c68b5a5bd9eef6f11d173a4ecb36cff37698b6097f4b8144c205fd62585f90e21b89dac6be8086f25d2
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_polish.langFilesize
356KB
MD5b18e8317c304d45704a2298dcca59e7d
SHA1d127f5daa2a6dd70f7fb0af9c048226f417b452f
SHA256c5bed4b6e4fffb864bc5314f81de1f206eadfcffedc75a0cbf0f07c81047ad3a
SHA512cda33ddd356513b7b3ae37c4483e7ee06005475967e871184079c4ba08430bbdfe0098d09ec476c4d821e7e21fd91b2622587ce70cd33df6048d7997151ca4b6
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_portuguese.langFilesize
358KB
MD5106cfc3c40e4eeca11c4264ec120514f
SHA153a418b2fec3eaa171464beb674e93022c0e62f1
SHA25663029ad335371feefa6f38b35ebeae643efbb369251b9773f212a5b79640507d
SHA5124ed03e90f223b951e08e3ca5d328e35b1421c40946f918274c5589029d3e80dfafc6f432755607ad269322b8ae36bf44bc59206294b647df1276316345c64c86
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_russian.langFilesize
360KB
MD5df313c0cf1629a0b8ef0155d201f1722
SHA14d40f70ee5a40437a22edd29b56e178de42868fa
SHA256a12b3d675f6eff07c4331a8abf9a4cb3c806618c9c3eb4a7dded4ea39c215f80
SHA512baa4d64868e65db30d9f5193ef29eb6ef589a0b3f78d153520c464d8dc1248a1db406ea487f762a8a63f6987d117dc8ddd1e6b0ab9f13fe908848beded2d0704
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\lang\Language_spanish.langFilesize
371KB
MD54366c4286cf305840372aad993c090ca
SHA1cb357756eca8a52d2c67ec5bf5c5de0ceffbdc47
SHA256e1dc3882e7308ba76c9ef2887f7355e1d86dce0f2ae506f2a1c98609a4311a77
SHA512042af06d2c5e79c0b36851b5198cca408ce9cdbc24cbb89898cafa4d09c97b7128f6c0b14419c1570d4af96de358ff4f730c7e238969e8c91cd4abf7dc23db56
-
C:\Users\Admin\AppData\Local\Temp\~111493598103716447\msimg32.dllFilesize
7KB
MD52e111b435e8013f5aba504f903a307cf
SHA1c082e11050a6e4e28c1993a74e64816e71d6fabf
SHA2562f55d527f6d6d41e8efacf926b4d8428abbcfa173861d526d67709bd6c4f78d2
SHA51234790015a1e7572cbba1a04a93427acb5c6ae164c4b81cad2fc355fd47664867eebd26f89f6d20d264461940bd95dec5091dbb1ee7c2362b38a1694b84424759
-
C:\Users\Admin\AppData\Local\Temp\~1692987073956872566~\sg.tmpFilesize
1.1MB
MD58a36dcd25ae8543d26b0a99b7d48864a
SHA172581de60cedf59b1b932f6201bafc7cb02bb56e
SHA256b3daf97e499467c6337b4320059ac44bc7a949dc4e500eb0d2f79f900a229531
SHA51226eecfa81f6c94a89d1f9be0224a3f36309a5c43d658055f48e6e7ee2847c29bddf665f077381ee5b318201bc7658f6cfc36d248f64f51302622e5e949f147ef
-
memory/932-134-0x0000000000000000-mapping.dmp
-
memory/2624-142-0x000007FF7D1A0000-0x000007FF7D1A6000-memory.dmpFilesize
24KB
-
memory/2624-147-0x000007FF7D1A0000-0x000007FF7D1A6000-memory.dmpFilesize
24KB
-
memory/2624-143-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB
-
memory/2624-137-0x0000000000000000-mapping.dmp
-
memory/2624-162-0x0000000140000000-0x000000014402F000-memory.dmpFilesize
64.2MB
-
memory/3492-132-0x0000000000000000-mapping.dmp
-
memory/4300-133-0x0000000140000000-0x00000001401F4000-memory.dmpFilesize
2.0MB
-
memory/4300-136-0x0000000140000000-0x00000001401F4000-memory.dmpFilesize
2.0MB