Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
31-07-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240705-en
General
-
Target
MalwareBazaar.exe
-
Size
810KB
-
MD5
60bd782aa615ee9354c2221b4ad7b80c
-
SHA1
f753f3c3c359b38c1051064417d6d0daf89db2c9
-
SHA256
62ca1c39badbfbc52c6301cb69c8356977db57656c6d98dac7e4ab908753af00
-
SHA512
0ddc9c16ac39aa6c006bd8ccd11194267b73d646b304f84b911153832dc7a6c960d60ebfc08d0d6314630e124e575bee4c81c75ffa7915faddaeae5d37b351e3
-
SSDEEP
12288:1y9WilQDz/bhj+nm3m6SsWCG0tP+KpIMD5w2T7S+w74fNJ658N:1wQDfhj+um6SgDEWHPdL65
Malware Config
Extracted
formbook
4.1
rn10
kedai168et.com
mental-olympics.com
pussybuildsstrongbones.net
857691.shop
hisellers.net
exposurecophotography.com
beaded-boutique.net
wednesdayholdings.com
plesacv.xyz
manonlineros.com
a0204.shop
333689g.com
dyprl716h.xyz
pulseirabet.com
fnet.work
bo-2024-001-v1-d1.xyz
ongaurdsecurity.com
giulianacristini.com
miladamani.com
magicalrealmshopkeeper.online
dy62i.com
pfjxhzz.com
yieks.voto
wallseason.com
kclsec.xyz
findwineinspace.com
everydayoptics.com
pg15.top
schody.net
82647351.com
fluteindia.com
infominer.club
kedai168el.com
compuglobalhypermeganet.app
designs-by-syn.com
godmachines.net
play-fortuna-ahf.buzz
lyjxk.com
waysfundraising.online
topuptalkmore.com
jingalraid.cfd
stonebahis411.com
adonicfuran.xyz
5z1lcnbm.fun
ignitorite.com
375bey.xyz
oloutlets.com
jn66-com-opqrst99988.com
xins.live
buchstabieralphabet.info
sfazzino.com
facai86.xyz
rapidsignsystems.com
golightresins.com
fpsportsmedia.com
superpawbulous.com
qsigoqav.xyz
anshtiwari314.online
flood-risk.net
voegbedrijf-offerte.com
onliinnforrmmosa.com
duangendget.store
georgiausssa.xyz
boldmusicmgt.com
teamhore724.buzz
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/1644-29-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1644-48-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2040-58-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Executes dropped EXE 7 IoCs
pid Process 1272 Ningbo .exe 1224 Ningbo .exe 1644 Ningbo .exe 2440 watchdog.exe 1220 watchdog.exe 1324 Ningbo .exe 1780 Ningbo .exe -
Loads dropped DLL 4 IoCs
pid Process 2860 cmd.exe 2860 cmd.exe 1272 Ningbo .exe 2440 watchdog.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ningbo = "C:\\Users\\Admin\\AppData\\Roaming\\Ningbo .exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1272 set thread context of 1644 1272 Ningbo .exe 41 PID 1644 set thread context of 1208 1644 Ningbo .exe 21 PID 1644 set thread context of 1208 1644 Ningbo .exe 21 PID 2040 set thread context of 1208 2040 msiexec.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language watchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ningbo .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language watchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2528 cmd.exe 2552 PING.EXE 2860 cmd.exe 2740 PING.EXE 1252 PING.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2740 PING.EXE 1252 PING.EXE 2552 PING.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3020 MalwareBazaar.exe 3020 MalwareBazaar.exe 3020 MalwareBazaar.exe 3020 MalwareBazaar.exe 3020 MalwareBazaar.exe 1272 Ningbo .exe 1272 Ningbo .exe 1272 Ningbo .exe 1272 Ningbo .exe 1272 Ningbo .exe 1644 Ningbo .exe 1644 Ningbo .exe 2440 watchdog.exe 1220 watchdog.exe 1220 watchdog.exe 1220 watchdog.exe 1272 Ningbo .exe 1272 Ningbo .exe 1644 Ningbo .exe 2040 msiexec.exe 2040 msiexec.exe 1272 Ningbo .exe 1272 Ningbo .exe 1272 Ningbo .exe 1272 Ningbo .exe 2040 msiexec.exe 2040 msiexec.exe 2040 msiexec.exe 2040 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1644 Ningbo .exe 1644 Ningbo .exe 1644 Ningbo .exe 1644 Ningbo .exe 2040 msiexec.exe 2040 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3020 MalwareBazaar.exe Token: SeDebugPrivilege 1272 Ningbo .exe Token: SeDebugPrivilege 1644 Ningbo .exe Token: SeDebugPrivilege 2440 watchdog.exe Token: SeDebugPrivilege 1220 watchdog.exe Token: SeDebugPrivilege 2040 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2528 3020 MalwareBazaar.exe 30 PID 3020 wrote to memory of 2528 3020 MalwareBazaar.exe 30 PID 3020 wrote to memory of 2528 3020 MalwareBazaar.exe 30 PID 3020 wrote to memory of 2528 3020 MalwareBazaar.exe 30 PID 2528 wrote to memory of 2552 2528 cmd.exe 32 PID 2528 wrote to memory of 2552 2528 cmd.exe 32 PID 2528 wrote to memory of 2552 2528 cmd.exe 32 PID 2528 wrote to memory of 2552 2528 cmd.exe 32 PID 3020 wrote to memory of 2860 3020 MalwareBazaar.exe 34 PID 3020 wrote to memory of 2860 3020 MalwareBazaar.exe 34 PID 3020 wrote to memory of 2860 3020 MalwareBazaar.exe 34 PID 3020 wrote to memory of 2860 3020 MalwareBazaar.exe 34 PID 2860 wrote to memory of 2740 2860 cmd.exe 36 PID 2860 wrote to memory of 2740 2860 cmd.exe 36 PID 2860 wrote to memory of 2740 2860 cmd.exe 36 PID 2860 wrote to memory of 2740 2860 cmd.exe 36 PID 2528 wrote to memory of 2920 2528 cmd.exe 37 PID 2528 wrote to memory of 2920 2528 cmd.exe 37 PID 2528 wrote to memory of 2920 2528 cmd.exe 37 PID 2528 wrote to memory of 2920 2528 cmd.exe 37 PID 2860 wrote to memory of 1252 2860 cmd.exe 38 PID 2860 wrote to memory of 1252 2860 cmd.exe 38 PID 2860 wrote to memory of 1252 2860 cmd.exe 38 PID 2860 wrote to memory of 1252 2860 cmd.exe 38 PID 2860 wrote to memory of 1272 2860 cmd.exe 39 PID 2860 wrote to memory of 1272 2860 cmd.exe 39 PID 2860 wrote to memory of 1272 2860 cmd.exe 39 PID 2860 wrote to memory of 1272 2860 cmd.exe 39 PID 1272 wrote to memory of 1224 1272 Ningbo .exe 40 PID 1272 wrote to memory of 1224 1272 Ningbo .exe 40 PID 1272 wrote to memory of 1224 1272 Ningbo .exe 40 PID 1272 wrote to memory of 1224 1272 Ningbo .exe 40 PID 1272 wrote to memory of 1224 1272 Ningbo .exe 40 PID 1272 wrote to memory of 1224 1272 Ningbo .exe 40 PID 1272 wrote to memory of 1224 1272 Ningbo .exe 40 PID 1272 wrote to memory of 1644 1272 Ningbo .exe 41 PID 1272 wrote to memory of 1644 1272 Ningbo .exe 41 PID 1272 wrote to memory of 1644 1272 Ningbo .exe 41 PID 1272 wrote to memory of 1644 1272 Ningbo .exe 41 PID 1272 wrote to memory of 1644 1272 Ningbo .exe 41 PID 1272 wrote to memory of 1644 1272 Ningbo .exe 41 PID 1272 wrote to memory of 1644 1272 Ningbo .exe 41 PID 1272 wrote to memory of 2440 1272 Ningbo .exe 42 PID 1272 wrote to memory of 2440 1272 Ningbo .exe 42 PID 1272 wrote to memory of 2440 1272 Ningbo .exe 42 PID 1272 wrote to memory of 2440 1272 Ningbo .exe 42 PID 2440 wrote to memory of 1220 2440 watchdog.exe 43 PID 2440 wrote to memory of 1220 2440 watchdog.exe 43 PID 2440 wrote to memory of 1220 2440 watchdog.exe 43 PID 2440 wrote to memory of 1220 2440 watchdog.exe 43 PID 1208 wrote to memory of 2040 1208 Explorer.EXE 44 PID 1208 wrote to memory of 2040 1208 Explorer.EXE 44 PID 1208 wrote to memory of 2040 1208 Explorer.EXE 44 PID 1208 wrote to memory of 2040 1208 Explorer.EXE 44 PID 1208 wrote to memory of 2040 1208 Explorer.EXE 44 PID 1208 wrote to memory of 2040 1208 Explorer.EXE 44 PID 1208 wrote to memory of 2040 1208 Explorer.EXE 44 PID 1272 wrote to memory of 1324 1272 Ningbo .exe 45 PID 1272 wrote to memory of 1324 1272 Ningbo .exe 45 PID 1272 wrote to memory of 1324 1272 Ningbo .exe 45 PID 1272 wrote to memory of 1324 1272 Ningbo .exe 45 PID 1272 wrote to memory of 1324 1272 Ningbo .exe 45 PID 1272 wrote to memory of 1324 1272 Ningbo .exe 45 PID 1272 wrote to memory of 1324 1272 Ningbo .exe 45
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 16 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Ningbo " /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Ningbo .exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 164⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2552
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Ningbo " /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Ningbo .exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 25 > nul && copy "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe" "C:\Users\Admin\AppData\Roaming\Ningbo .exe" && ping 127.0.0.1 -n 25 > nul && "C:\Users\Admin\AppData\Roaming\Ningbo .exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 254⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2740
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 254⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1252
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵
- Executes dropped EXE
PID:1224
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\watchdog.exe"C:\Users\Admin\AppData\Local\Temp\watchdog.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\watchdog.exe"C:\Users\Admin\AppData\Local\Temp\watchdog.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵
- Executes dropped EXE
PID:1324
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵
- Executes dropped EXE
PID:1780
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵PID:1880
-
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\Ningbo .exe"3⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
53B
MD5d89b3f5e78be20379d30a42c49678ad3
SHA1361b270a09529e704b8187c55db2ac81b2ee4589
SHA2563d3f891c4be265e13346301e1e162807a3f68bf996bfccb3d840806989e01742
SHA51244b6cc2715aaf6290ae598b8824d2b3b001e9db75ff51de0aa9c31cfb9d574bde6275677d3a06f94f1bf7666f65d85adc7e3832125f160109eda211b274d2207
-
Filesize
56B
MD5451720a70cf5e512eca7279c72c71f2c
SHA1274f9b02865060d72012f7cbd986789a8118908f
SHA256551d410e5e2fd19e8529581c8fab5ec4651883a201215ef52ce37aab63077074
SHA512b4e15a297a3d7d105af0d92d98bd55c1a621ad4e8b7b8d4e63fa21f7045593cfd7712678eabfc8632bbd501f409597cb6c3ae8110e840fb335fac4036d6f680f
-
Filesize
810KB
MD560bd782aa615ee9354c2221b4ad7b80c
SHA1f753f3c3c359b38c1051064417d6d0daf89db2c9
SHA25662ca1c39badbfbc52c6301cb69c8356977db57656c6d98dac7e4ab908753af00
SHA5120ddc9c16ac39aa6c006bd8ccd11194267b73d646b304f84b911153832dc7a6c960d60ebfc08d0d6314630e124e575bee4c81c75ffa7915faddaeae5d37b351e3