Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240705-en
General
-
Target
MalwareBazaar.exe
-
Size
810KB
-
MD5
60bd782aa615ee9354c2221b4ad7b80c
-
SHA1
f753f3c3c359b38c1051064417d6d0daf89db2c9
-
SHA256
62ca1c39badbfbc52c6301cb69c8356977db57656c6d98dac7e4ab908753af00
-
SHA512
0ddc9c16ac39aa6c006bd8ccd11194267b73d646b304f84b911153832dc7a6c960d60ebfc08d0d6314630e124e575bee4c81c75ffa7915faddaeae5d37b351e3
-
SSDEEP
12288:1y9WilQDz/bhj+nm3m6SsWCG0tP+KpIMD5w2T7S+w74fNJ658N:1wQDfhj+um6SgDEWHPdL65
Malware Config
Extracted
formbook
4.1
rn10
kedai168et.com
mental-olympics.com
pussybuildsstrongbones.net
857691.shop
hisellers.net
exposurecophotography.com
beaded-boutique.net
wednesdayholdings.com
plesacv.xyz
manonlineros.com
a0204.shop
333689g.com
dyprl716h.xyz
pulseirabet.com
fnet.work
bo-2024-001-v1-d1.xyz
ongaurdsecurity.com
giulianacristini.com
miladamani.com
magicalrealmshopkeeper.online
dy62i.com
pfjxhzz.com
yieks.voto
wallseason.com
kclsec.xyz
findwineinspace.com
everydayoptics.com
pg15.top
schody.net
82647351.com
fluteindia.com
infominer.club
kedai168el.com
compuglobalhypermeganet.app
designs-by-syn.com
godmachines.net
play-fortuna-ahf.buzz
lyjxk.com
waysfundraising.online
topuptalkmore.com
jingalraid.cfd
stonebahis411.com
adonicfuran.xyz
5z1lcnbm.fun
ignitorite.com
375bey.xyz
oloutlets.com
jn66-com-opqrst99988.com
xins.live
buchstabieralphabet.info
sfazzino.com
facai86.xyz
rapidsignsystems.com
golightresins.com
fpsportsmedia.com
superpawbulous.com
qsigoqav.xyz
anshtiwari314.online
flood-risk.net
voegbedrijf-offerte.com
onliinnforrmmosa.com
duangendget.store
georgiausssa.xyz
boldmusicmgt.com
teamhore724.buzz
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4580-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4268-51-0x0000000000550000-0x000000000057F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation Ningbo .exe Key value queried \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Control Panel\International\Geo\Nation watchdog.exe -
Executes dropped EXE 6 IoCs
pid Process 3836 Ningbo .exe 1356 Ningbo .exe 4580 Ningbo .exe 1032 watchdog.exe 3492 watchdog.exe 1960 Ningbo .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ningbo = "C:\\Users\\Admin\\AppData\\Roaming\\Ningbo .exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3836 set thread context of 4580 3836 Ningbo .exe 95 PID 4580 set thread context of 3500 4580 Ningbo .exe 55 PID 4268 set thread context of 3500 4268 msiexec.exe 55 PID 3836 set thread context of 1960 3836 Ningbo .exe 99 PID 1960 set thread context of 3500 1960 Ningbo .exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language watchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ningbo .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language watchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4124 cmd.exe 3700 PING.EXE 5084 cmd.exe 3760 PING.EXE 4164 PING.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3700 PING.EXE 3760 PING.EXE 4164 PING.EXE -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 776 MalwareBazaar.exe 3836 Ningbo .exe 3836 Ningbo .exe 3836 Ningbo .exe 3836 Ningbo .exe 3836 Ningbo .exe 4580 Ningbo .exe 4580 Ningbo .exe 4580 Ningbo .exe 4580 Ningbo .exe 1032 watchdog.exe 3492 watchdog.exe 3492 watchdog.exe 3492 watchdog.exe 4268 msiexec.exe 4268 msiexec.exe 3836 Ningbo .exe 3836 Ningbo .exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 3836 Ningbo .exe 1960 Ningbo .exe 1960 Ningbo .exe 1960 Ningbo .exe 1960 Ningbo .exe 4268 msiexec.exe 4268 msiexec.exe 1432 raserver.exe 1432 raserver.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe 4268 msiexec.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4580 Ningbo .exe 4580 Ningbo .exe 4580 Ningbo .exe 4268 msiexec.exe 4268 msiexec.exe 1960 Ningbo .exe 1960 Ningbo .exe 1960 Ningbo .exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 776 MalwareBazaar.exe Token: SeDebugPrivilege 3836 Ningbo .exe Token: SeDebugPrivilege 4580 Ningbo .exe Token: SeDebugPrivilege 1032 watchdog.exe Token: SeDebugPrivilege 3492 watchdog.exe Token: SeDebugPrivilege 4268 msiexec.exe Token: SeDebugPrivilege 1960 Ningbo .exe Token: SeDebugPrivilege 1432 raserver.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 776 wrote to memory of 4124 776 MalwareBazaar.exe 84 PID 776 wrote to memory of 4124 776 MalwareBazaar.exe 84 PID 776 wrote to memory of 4124 776 MalwareBazaar.exe 84 PID 4124 wrote to memory of 3700 4124 cmd.exe 86 PID 4124 wrote to memory of 3700 4124 cmd.exe 86 PID 4124 wrote to memory of 3700 4124 cmd.exe 86 PID 776 wrote to memory of 5084 776 MalwareBazaar.exe 87 PID 776 wrote to memory of 5084 776 MalwareBazaar.exe 87 PID 776 wrote to memory of 5084 776 MalwareBazaar.exe 87 PID 5084 wrote to memory of 3760 5084 cmd.exe 89 PID 5084 wrote to memory of 3760 5084 cmd.exe 89 PID 5084 wrote to memory of 3760 5084 cmd.exe 89 PID 4124 wrote to memory of 1096 4124 cmd.exe 90 PID 4124 wrote to memory of 1096 4124 cmd.exe 90 PID 4124 wrote to memory of 1096 4124 cmd.exe 90 PID 5084 wrote to memory of 4164 5084 cmd.exe 91 PID 5084 wrote to memory of 4164 5084 cmd.exe 91 PID 5084 wrote to memory of 4164 5084 cmd.exe 91 PID 5084 wrote to memory of 3836 5084 cmd.exe 93 PID 5084 wrote to memory of 3836 5084 cmd.exe 93 PID 5084 wrote to memory of 3836 5084 cmd.exe 93 PID 3836 wrote to memory of 1356 3836 Ningbo .exe 94 PID 3836 wrote to memory of 1356 3836 Ningbo .exe 94 PID 3836 wrote to memory of 1356 3836 Ningbo .exe 94 PID 3836 wrote to memory of 1356 3836 Ningbo .exe 94 PID 3836 wrote to memory of 1356 3836 Ningbo .exe 94 PID 3836 wrote to memory of 1356 3836 Ningbo .exe 94 PID 3836 wrote to memory of 4580 3836 Ningbo .exe 95 PID 3836 wrote to memory of 4580 3836 Ningbo .exe 95 PID 3836 wrote to memory of 4580 3836 Ningbo .exe 95 PID 3836 wrote to memory of 4580 3836 Ningbo .exe 95 PID 3836 wrote to memory of 4580 3836 Ningbo .exe 95 PID 3836 wrote to memory of 4580 3836 Ningbo .exe 95 PID 3500 wrote to memory of 4268 3500 Explorer.EXE 96 PID 3500 wrote to memory of 4268 3500 Explorer.EXE 96 PID 3500 wrote to memory of 4268 3500 Explorer.EXE 96 PID 3836 wrote to memory of 1032 3836 Ningbo .exe 97 PID 3836 wrote to memory of 1032 3836 Ningbo .exe 97 PID 3836 wrote to memory of 1032 3836 Ningbo .exe 97 PID 1032 wrote to memory of 3492 1032 watchdog.exe 98 PID 1032 wrote to memory of 3492 1032 watchdog.exe 98 PID 1032 wrote to memory of 3492 1032 watchdog.exe 98 PID 3836 wrote to memory of 1960 3836 Ningbo .exe 99 PID 3836 wrote to memory of 1960 3836 Ningbo .exe 99 PID 3836 wrote to memory of 1960 3836 Ningbo .exe 99 PID 3836 wrote to memory of 1960 3836 Ningbo .exe 99 PID 3836 wrote to memory of 1960 3836 Ningbo .exe 99 PID 3836 wrote to memory of 1960 3836 Ningbo .exe 99 PID 4268 wrote to memory of 4940 4268 msiexec.exe 100 PID 4268 wrote to memory of 4940 4268 msiexec.exe 100 PID 4268 wrote to memory of 4940 4268 msiexec.exe 100 PID 3500 wrote to memory of 1432 3500 Explorer.EXE 102 PID 3500 wrote to memory of 1432 3500 Explorer.EXE 102 PID 3500 wrote to memory of 1432 3500 Explorer.EXE 102 PID 3836 wrote to memory of 372 3836 Ningbo .exe 103 PID 3836 wrote to memory of 372 3836 Ningbo .exe 103 PID 3836 wrote to memory of 372 3836 Ningbo .exe 103 PID 3836 wrote to memory of 372 3836 Ningbo .exe 103 PID 3836 wrote to memory of 372 3836 Ningbo .exe 103 PID 3836 wrote to memory of 372 3836 Ningbo .exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 15 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Ningbo " /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Ningbo .exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 154⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3700
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Ningbo " /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Ningbo .exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 18 > nul && copy "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe" "C:\Users\Admin\AppData\Roaming\Ningbo .exe" && ping 127.0.0.1 -n 18 > nul && "C:\Users\Admin\AppData\Roaming\Ningbo .exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 184⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3760
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 184⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4164
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵
- Executes dropped EXE
PID:1356
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\watchdog.exe"C:\Users\Admin\AppData\Local\Temp\watchdog.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\watchdog.exe"C:\Users\Admin\AppData\Local\Temp\watchdog.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Users\Admin\AppData\Roaming\Ningbo .exe"C:\Users\Admin\AppData\Roaming\Ningbo .exe"5⤵PID:372
-
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Roaming\Ningbo .exe"3⤵
- System Location Discovery: System Language Discovery
PID:4940
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
53B
MD5487a8e47c270d9c8635de5a49c0c3381
SHA1f6ca25ac1d25d6d8185dfdffafb5912a3d074f56
SHA25601c78bb85736388cf798e0fd8a26c1c132e665e23a963c285ac46830e2c60d19
SHA512dd32e853352c894d0f632c4bf1e71620a53d39e059201bb49c207ec831e2a8f14797c9f99c41b8a22eef8f6d79fbf2e968ce6e7252bcab2d17cac04ac6c96d85
-
Filesize
56B
MD539034394d8cd2685a5a492127c6c3758
SHA1390dfae7d54accfd74e912e67df553d33fd98b76
SHA256ebcb4ace0869c35fd553c777cd37a5940fba1fb716588a4ae3ccfc137177628f
SHA51208123a8e48f2e89358edb1696853705bca27d91b0de627879f18d2254eb250870c6f64b350912887dee4ae3e72af9e1ca76ad0e1b2752ec2d0143238eb5cb86f
-
Filesize
56B
MD5cfcdd947bb77272a0d266e2c378dc638
SHA14f96a4302b7776eafa0b22df6a0dedf8acdc1b7e
SHA2565d19b848495a3c758628cb1cc1353f365535a739b9bf7f8ac52c2b311a946250
SHA5126686d2b262b4cec27545cc9c08f7ad66f7f15b73c18c31a26ce5354e79ecc88d507e9b55aca1599838175450249ff6626153e8f4fcb099806819922055559325
-
Filesize
810KB
MD560bd782aa615ee9354c2221b4ad7b80c
SHA1f753f3c3c359b38c1051064417d6d0daf89db2c9
SHA25662ca1c39badbfbc52c6301cb69c8356977db57656c6d98dac7e4ab908753af00
SHA5120ddc9c16ac39aa6c006bd8ccd11194267b73d646b304f84b911153832dc7a6c960d60ebfc08d0d6314630e124e575bee4c81c75ffa7915faddaeae5d37b351e3