Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240704-en
General
-
Target
MalwareBazaar.exe
-
Size
483KB
-
MD5
fd65054f56f7077c515ad94d82d63392
-
SHA1
63a48e65af8911d5aeacc86b56775a27ae4b48f6
-
SHA256
19fef236cdf3c97076fe4dae603f81e836e2aa3ce93865a328b7cd44e560bee7
-
SHA512
06b96741242ec89b09ece150613257430a6463c769e956fb4f9cd4d5fa36970c5f06b7faaca18c702b92d08a65a1a787057c8b73f2059c9949068ba3cc41e6e3
-
SSDEEP
6144:CIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9x:Ph8Mz+sv3y2N1xzAZprkmuN/SD5iKefT
Malware Config
Extracted
formbook
3.9
ow
piavecaffe.com
jlxkqg.men
lifesavingfoundation.net
karadasama.net
michaeltraolach-macsweeney.com
thunderwatches.com
serviciocasawhirlpool.biz
c-cap.online
itparksolution.com
clarityhearingkw.com
wpgrosiri.date
colemarshalcambell.com
webperffest.com
adjusterforirma.info
buildersqq.com
spiritualwisdominindia.com
111222333.net
traditionalarabicdishes.com
hmlifi.com
receive-our-info-heredaily.info
whitecoins.info
woodiesrattlers.com
www8458l.com
fifanie.com
xn--qrq721bqkkzt3b.net
mesquiteleaffarm.com
xn--30-yo3c105l5jn.com
imaginaryfair.com
dawnanddusted.com
youeronline.com
alyssabrandonportfolio.com
winhealthalert.info
fithappenseveryday.com
3dreplicant.net
exiaomaipu.com
billsmockupdomain.com
radicalmiddleusa.com
fatblastingsupplements.com
okvidaoapp.com
1024eees.info
gdbaisu.com
soluciones-libres.com
guansaidingzhi.com
francesca-lynagh.com
airbodycare.com
atlutes.com
learningtolaughintherain.com
zology-tek.com
bjlmzk.com
watchinglass.com
belltowerhealthcare.com
gaetvr.men
xn--j7q21wggj81l.net
photos4lyfe.net
paisaghat.com
repairextend.win
lifesciencescareers.com
bazar-199.com
timepieceluxury.com
wizeater.com
itdui.com
johnshookgp.com
lesderniers.com
goodsystemforupdates.review
cybep.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/112-22-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/112-26-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2832 syscheck.exe 112 syscheck.exe -
Loads dropped DLL 2 IoCs
pid Process 2824 cmd.exe 2832 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2832 set thread context of 112 2832 syscheck.exe 36 PID 112 set thread context of 1204 112 syscheck.exe 21 PID 112 set thread context of 1204 112 syscheck.exe 21 PID 2988 set thread context of 1204 2988 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syscheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 112 syscheck.exe 112 syscheck.exe 112 syscheck.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe 2988 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 112 syscheck.exe 112 syscheck.exe 112 syscheck.exe 112 syscheck.exe 2988 svchost.exe 2988 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2420 MalwareBazaar.exe Token: SeDebugPrivilege 2832 syscheck.exe Token: SeDebugPrivilege 112 syscheck.exe Token: SeDebugPrivilege 2988 svchost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2364 2420 MalwareBazaar.exe 31 PID 2420 wrote to memory of 2364 2420 MalwareBazaar.exe 31 PID 2420 wrote to memory of 2364 2420 MalwareBazaar.exe 31 PID 2420 wrote to memory of 2364 2420 MalwareBazaar.exe 31 PID 2420 wrote to memory of 2824 2420 MalwareBazaar.exe 33 PID 2420 wrote to memory of 2824 2420 MalwareBazaar.exe 33 PID 2420 wrote to memory of 2824 2420 MalwareBazaar.exe 33 PID 2420 wrote to memory of 2824 2420 MalwareBazaar.exe 33 PID 2824 wrote to memory of 2832 2824 cmd.exe 35 PID 2824 wrote to memory of 2832 2824 cmd.exe 35 PID 2824 wrote to memory of 2832 2824 cmd.exe 35 PID 2824 wrote to memory of 2832 2824 cmd.exe 35 PID 2832 wrote to memory of 112 2832 syscheck.exe 36 PID 2832 wrote to memory of 112 2832 syscheck.exe 36 PID 2832 wrote to memory of 112 2832 syscheck.exe 36 PID 2832 wrote to memory of 112 2832 syscheck.exe 36 PID 2832 wrote to memory of 112 2832 syscheck.exe 36 PID 2832 wrote to memory of 112 2832 syscheck.exe 36 PID 2832 wrote to memory of 112 2832 syscheck.exe 36 PID 1204 wrote to memory of 2988 1204 Explorer.EXE 37 PID 1204 wrote to memory of 2988 1204 Explorer.EXE 37 PID 1204 wrote to memory of 2988 1204 Explorer.EXE 37 PID 1204 wrote to memory of 2988 1204 Explorer.EXE 37 PID 2988 wrote to memory of 2980 2988 svchost.exe 38 PID 2988 wrote to memory of 2980 2988 svchost.exe 38 PID 2988 wrote to memory of 2980 2988 svchost.exe 38 PID 2988 wrote to memory of 2980 2988 svchost.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5fd65054f56f7077c515ad94d82d63392
SHA163a48e65af8911d5aeacc86b56775a27ae4b48f6
SHA25619fef236cdf3c97076fe4dae603f81e836e2aa3ce93865a328b7cd44e560bee7
SHA51206b96741242ec89b09ece150613257430a6463c769e956fb4f9cd4d5fa36970c5f06b7faaca18c702b92d08a65a1a787057c8b73f2059c9949068ba3cc41e6e3