Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240704-en
General
-
Target
MalwareBazaar.exe
-
Size
483KB
-
MD5
fd65054f56f7077c515ad94d82d63392
-
SHA1
63a48e65af8911d5aeacc86b56775a27ae4b48f6
-
SHA256
19fef236cdf3c97076fe4dae603f81e836e2aa3ce93865a328b7cd44e560bee7
-
SHA512
06b96741242ec89b09ece150613257430a6463c769e956fb4f9cd4d5fa36970c5f06b7faaca18c702b92d08a65a1a787057c8b73f2059c9949068ba3cc41e6e3
-
SSDEEP
6144:CIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9x:Ph8Mz+sv3y2N1xzAZprkmuN/SD5iKefT
Malware Config
Extracted
formbook
3.9
ow
piavecaffe.com
jlxkqg.men
lifesavingfoundation.net
karadasama.net
michaeltraolach-macsweeney.com
thunderwatches.com
serviciocasawhirlpool.biz
c-cap.online
itparksolution.com
clarityhearingkw.com
wpgrosiri.date
colemarshalcambell.com
webperffest.com
adjusterforirma.info
buildersqq.com
spiritualwisdominindia.com
111222333.net
traditionalarabicdishes.com
hmlifi.com
receive-our-info-heredaily.info
whitecoins.info
woodiesrattlers.com
www8458l.com
fifanie.com
xn--qrq721bqkkzt3b.net
mesquiteleaffarm.com
xn--30-yo3c105l5jn.com
imaginaryfair.com
dawnanddusted.com
youeronline.com
alyssabrandonportfolio.com
winhealthalert.info
fithappenseveryday.com
3dreplicant.net
exiaomaipu.com
billsmockupdomain.com
radicalmiddleusa.com
fatblastingsupplements.com
okvidaoapp.com
1024eees.info
gdbaisu.com
soluciones-libres.com
guansaidingzhi.com
francesca-lynagh.com
airbodycare.com
atlutes.com
learningtolaughintherain.com
zology-tek.com
bjlmzk.com
watchinglass.com
belltowerhealthcare.com
gaetvr.men
xn--j7q21wggj81l.net
photos4lyfe.net
paisaghat.com
repairextend.win
lifesciencescareers.com
bazar-199.com
timepieceluxury.com
wizeater.com
itdui.com
johnshookgp.com
lesderniers.com
goodsystemforupdates.review
cybep.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2012-19-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/2012-25-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation MalwareBazaar.exe -
Executes dropped EXE 2 IoCs
pid Process 2960 syscheck.exe 2012 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2960 set thread context of 2012 2960 syscheck.exe 103 PID 2012 set thread context of 3452 2012 syscheck.exe 56 PID 4572 set thread context of 3452 4572 cmstp.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syscheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2012 syscheck.exe 2012 syscheck.exe 2012 syscheck.exe 2012 syscheck.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe 4572 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2012 syscheck.exe 2012 syscheck.exe 2012 syscheck.exe 4572 cmstp.exe 4572 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1168 MalwareBazaar.exe Token: SeDebugPrivilege 2960 syscheck.exe Token: SeDebugPrivilege 2012 syscheck.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeDebugPrivilege 4572 cmstp.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3452 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4976 1168 MalwareBazaar.exe 94 PID 1168 wrote to memory of 4976 1168 MalwareBazaar.exe 94 PID 1168 wrote to memory of 4976 1168 MalwareBazaar.exe 94 PID 1168 wrote to memory of 3332 1168 MalwareBazaar.exe 99 PID 1168 wrote to memory of 3332 1168 MalwareBazaar.exe 99 PID 1168 wrote to memory of 3332 1168 MalwareBazaar.exe 99 PID 3332 wrote to memory of 2960 3332 cmd.exe 101 PID 3332 wrote to memory of 2960 3332 cmd.exe 101 PID 3332 wrote to memory of 2960 3332 cmd.exe 101 PID 2960 wrote to memory of 2012 2960 syscheck.exe 103 PID 2960 wrote to memory of 2012 2960 syscheck.exe 103 PID 2960 wrote to memory of 2012 2960 syscheck.exe 103 PID 2960 wrote to memory of 2012 2960 syscheck.exe 103 PID 2960 wrote to memory of 2012 2960 syscheck.exe 103 PID 2960 wrote to memory of 2012 2960 syscheck.exe 103 PID 3452 wrote to memory of 4572 3452 Explorer.EXE 104 PID 3452 wrote to memory of 4572 3452 Explorer.EXE 104 PID 3452 wrote to memory of 4572 3452 Explorer.EXE 104 PID 4572 wrote to memory of 216 4572 cmstp.exe 105 PID 4572 wrote to memory of 216 4572 cmstp.exe 105 PID 4572 wrote to memory of 216 4572 cmstp.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5fd65054f56f7077c515ad94d82d63392
SHA163a48e65af8911d5aeacc86b56775a27ae4b48f6
SHA25619fef236cdf3c97076fe4dae603f81e836e2aa3ce93865a328b7cd44e560bee7
SHA51206b96741242ec89b09ece150613257430a6463c769e956fb4f9cd4d5fa36970c5f06b7faaca18c702b92d08a65a1a787057c8b73f2059c9949068ba3cc41e6e3