Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe
Resource
win10v2004-20240426-en
General
-
Target
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe
-
Size
65KB
-
MD5
29a482d6aa05e9603c7e42b1cfac8830
-
SHA1
8b6c749d3ef41a17b79722cfef5a4f3c63c7ef87
-
SHA256
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c
-
SHA512
0d4bea29df7993c6318057eb08c7a2001f851d2620c5cbf3e20629087e7ab4527918a1e1c99e297cffe7d0498bbfbfe474ea8d26a2cd5210d4ec97c57fc0569d
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ou7:7WNqkOJWmo1HpM0MkTUmu7
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral2/memory/2184-37-0x0000000074D90000-0x0000000074EED000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 1932 explorer.exe 3620 spoolsv.exe 2184 svchost.exe 2404 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exeexplorer.exesvchost.exepid process 1236 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe 1236 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 2184 svchost.exe 1932 explorer.exe 2184 svchost.exe 1932 explorer.exe 2184 svchost.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe 1932 explorer.exe 2184 svchost.exe 2184 svchost.exe 1932 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 1932 explorer.exe 2184 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1236 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe 1236 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe 1932 explorer.exe 1932 explorer.exe 3620 spoolsv.exe 3620 spoolsv.exe 2184 svchost.exe 2184 svchost.exe 2404 spoolsv.exe 2404 spoolsv.exe 1932 explorer.exe 1932 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1236 wrote to memory of 1932 1236 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe explorer.exe PID 1236 wrote to memory of 1932 1236 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe explorer.exe PID 1236 wrote to memory of 1932 1236 5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe explorer.exe PID 1932 wrote to memory of 3620 1932 explorer.exe spoolsv.exe PID 1932 wrote to memory of 3620 1932 explorer.exe spoolsv.exe PID 1932 wrote to memory of 3620 1932 explorer.exe spoolsv.exe PID 3620 wrote to memory of 2184 3620 spoolsv.exe svchost.exe PID 3620 wrote to memory of 2184 3620 spoolsv.exe svchost.exe PID 3620 wrote to memory of 2184 3620 spoolsv.exe svchost.exe PID 2184 wrote to memory of 2404 2184 svchost.exe spoolsv.exe PID 2184 wrote to memory of 2404 2184 svchost.exe spoolsv.exe PID 2184 wrote to memory of 2404 2184 svchost.exe spoolsv.exe PID 2184 wrote to memory of 4876 2184 svchost.exe at.exe PID 2184 wrote to memory of 4876 2184 svchost.exe at.exe PID 2184 wrote to memory of 4876 2184 svchost.exe at.exe PID 2184 wrote to memory of 1612 2184 svchost.exe at.exe PID 2184 wrote to memory of 1612 2184 svchost.exe at.exe PID 2184 wrote to memory of 1612 2184 svchost.exe at.exe PID 2184 wrote to memory of 4176 2184 svchost.exe at.exe PID 2184 wrote to memory of 4176 2184 svchost.exe at.exe PID 2184 wrote to memory of 4176 2184 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe"C:\Users\Admin\AppData\Local\Temp\5e0c522ddbdfa11823523f092ee8c31f20a50db180afacab887e6d9badc9525c.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3620 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Windows\SysWOW64\at.exeat 00:05 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4876
-
C:\Windows\SysWOW64\at.exeat 00:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1612
-
C:\Windows\SysWOW64\at.exeat 00:07 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD57e41a1d1ceddfd211a48faceea3701c8
SHA18982690c0001c22524afb29ad95e7b3ee01b8f4a
SHA2566a1bd1ff11ee5a071c0e518e072cf0dbaf67434178a152410d1e6f842ff3b009
SHA51253843b71210f9a062eda1a5a874b1f209e2529dbda28fd6fd366a5a41ac17862d3fb2730d0ddf9ff412690482a2dbf7e0496eb3609e288bfa5732d341c8dd5e1
-
Filesize
65KB
MD5c1186ae7a442ee360250cc713e56114b
SHA1980de9d930825cc0d8f49166b1a7e04c0bf925e3
SHA256f9e86e0fa5ccb42f4ca31bc551155ccb7c5b96faeb33b5c79648fbe426e577fb
SHA5125a5802129b8333b668fb86ee21d9d93cdea790a6ed923cc6da4413d883fa1be722090c79d6c64a4ff63ade129c99367273c5d3a49f485d29c0c13eb11b34da0f
-
Filesize
65KB
MD56171d6f9711a147931fa599eee206861
SHA107b7fcb105b5ce7b70487c39c85172da45eeede7
SHA2562c9860783f57146f5c4ef7482591ac195630c0ea8aed43e5723301f0d7169f9a
SHA5120fe106d26489c415f6f1dc2b9b880b125f59f88d5974daa5a56f224052353ba254cfcdebe6190226a4f49474d33bd4438f3ce98ec41c98f2be5300de8659aa7c
-
Filesize
65KB
MD563e3387c20c911b55eafbd7b89532a00
SHA14e3cf1ea3854b8374d2124e12114ece972807aff
SHA256232d4f94e3a596cb8e06e1d9d99114169b4f95679cf4eaad660c8c73366b83d4
SHA5122a4d160f71efa0c3a1caf97479c4c2015e6734969761d013805612612db0d68001cffa941dcaf6969d00ace678424812c6773724773ebf9c44cd87ea5fe96d56
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e