Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240704-en
General
-
Target
MalwareBazaar.exe
-
Size
1.1MB
-
MD5
fad2601b8d3ae921451df530f754a105
-
SHA1
cd2e6daa5a20510ca430fd4ad0e7297f3658308e
-
SHA256
29d57050ee10327642136e9e1a394ca996b42b95bae45d3dd44e392cec83c027
-
SHA512
51176dd307286fc4a9b07cca80356a6c2b0f42a1fe947296a5f11f360ed54ea8299315223183e818da250a71f75a6134b6aafa4d3598310b896dbb9f8f8ac32d
-
SSDEEP
24576:BqDEvCTbMWu7rQYlBQcBiT6rprG8aCHhItAQFbb2:BTvC/MTQYxsWR7aCH/Q9
Malware Config
Extracted
formbook
4.1
dz16
gravechill.com
goniu-6520.cyou
qbwlszmf.xyz
computingthecosmos.com
m327841.com
socradex.com
outsidewallornaments.com
emadkasndfg.top
khaleejmed.online
awaz.shop
sunkar.capital
unlimited-merch.com
deboenterprise.net
darma88win.shop
593785.com
flyingcakecompany.com
toyorgga.shop
vyrqjrwh.xyz
window-replacement-26046.bond
marucoin.live
vp798.com
instoneru.xyz
stairlifts02.bond
6666002.xyz
refracrieang.com
fmi-lost-device.com
95626713.com
dragon969-site.com
almaymai.com
lkiv.xyz
llr.realty
thetreasurerealm.com
johnshaddixrandalldykes.info
only-optimal.com
sub2summit.com
hoth.systems
pekan77.pro
sabiselalumantap.shop
simplway.com
aity63.app
electricbikestoday.fyi
xn--ligeevent-13a.com
backpainsciatica.com
theproteacollection.com
matadong.com
thevoidedits.com
arnoldserame.com
sneakpeakvail.com
1xslots-jgh.top
damndead.fit
oberoninvestment.com
aity18.app
lmmxw.com
lasercuttingmachines517388.life
browneyebeautydesign.com
martialartsnewyork.nyc
2vv.site
jfqdm.club
488987.vip
jeannettbarr.monster
heoco.net
mytrendyworld.net
ghospital.online
lusticoin.xyz
stellargrowthdigital.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1060-30-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1060-33-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1060-37-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4168-42-0x0000000000380000-0x00000000003AF000-memory.dmp formbook -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 4932 name.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000c0000000234b1-14.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4932 set thread context of 1060 4932 name.exe 87 PID 1060 set thread context of 3504 1060 svchost.exe 56 PID 1060 set thread context of 3504 1060 svchost.exe 56 PID 4168 set thread context of 3504 4168 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1060 svchost.exe 1060 svchost.exe 1060 svchost.exe 1060 svchost.exe 1060 svchost.exe 1060 svchost.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe 4168 help.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4932 name.exe 1060 svchost.exe 1060 svchost.exe 1060 svchost.exe 1060 svchost.exe 4168 help.exe 4168 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1060 svchost.exe Token: SeDebugPrivilege 4168 help.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4532 MalwareBazaar.exe 4532 MalwareBazaar.exe 4932 name.exe 4932 name.exe 3504 Explorer.EXE 3504 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4532 MalwareBazaar.exe 4532 MalwareBazaar.exe 4932 name.exe 4932 name.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3504 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4932 4532 MalwareBazaar.exe 86 PID 4532 wrote to memory of 4932 4532 MalwareBazaar.exe 86 PID 4532 wrote to memory of 4932 4532 MalwareBazaar.exe 86 PID 4932 wrote to memory of 1060 4932 name.exe 87 PID 4932 wrote to memory of 1060 4932 name.exe 87 PID 4932 wrote to memory of 1060 4932 name.exe 87 PID 4932 wrote to memory of 1060 4932 name.exe 87 PID 3504 wrote to memory of 4168 3504 Explorer.EXE 88 PID 3504 wrote to memory of 4168 3504 Explorer.EXE 88 PID 3504 wrote to memory of 4168 3504 Explorer.EXE 88 PID 4168 wrote to memory of 2208 4168 help.exe 89 PID 4168 wrote to memory of 2208 4168 help.exe 89 PID 4168 wrote to memory of 2208 4168 help.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5b769e9647555650f3bf9f5f141df5187
SHA16ce3042ba36f8a7779b609688cdd78c6fb1d4774
SHA256cb3d3e699e9da8852d2621720ed0f72694e6743a3cf1a4e1e3c6d57c84dc0c06
SHA51244ddc55edda392faf7d94d4efb9a5c15d0d441f60a4e65c40950dd9f40471b2d1be49a27986d8109d4c854f3aa12ac09b8fb80eefe4eb908e9116ca9d3861023
-
Filesize
1.1MB
MD5fad2601b8d3ae921451df530f754a105
SHA1cd2e6daa5a20510ca430fd4ad0e7297f3658308e
SHA25629d57050ee10327642136e9e1a394ca996b42b95bae45d3dd44e392cec83c027
SHA51251176dd307286fc4a9b07cca80356a6c2b0f42a1fe947296a5f11f360ed54ea8299315223183e818da250a71f75a6134b6aafa4d3598310b896dbb9f8f8ac32d