Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240704-en
General
-
Target
MalwareBazaar.exe
-
Size
653KB
-
MD5
4f9709aa08fb342403b4a9d952419184
-
SHA1
07913a57cfe7e1674525397f571ae98d3195a11c
-
SHA256
1b9e77854e399411406c1f8e3fa6e0bceb4a1284c7bedeed503bcb24bdcfbe30
-
SHA512
cde7fe3db0ee4fd1876e3b40601e4d9c81ae4b2fa525335d183c9d0314fde6eaaa5820303d3fd2eb0a008f09511c08967fe0ba00fea83c9dee8d98d80f513fe0
-
SSDEEP
12288:3Zxa/zmcDXmyLO609WOgt3MbOSJ6gAFss9ewhMBdULG503vdPlLVBkR:3ZxaakZb0wr3MRJ7U9ZMBYG503DLVc
Malware Config
Extracted
formbook
4.1
v15n
dyahwoahjuk.store
toysstorm.com
y7rak9.com
2222233p6.shop
betbox2341.com
visualvarta.com
nijssenadventures.com
main-12.site
leng4d.net
kurainu.xyz
hatesa.xyz
culturamosaica.com
supermallify.store
gigboard.app
rxforgive.com
ameliestones.com
kapalwin.live
tier.credit
sobol-ksa.com
faredeal.online
226b.xyz
talktohannaford500.shop
mxrkpkngishbdss.xyz
mirotcg.info
turbo3club.site
hjnd28t010cop.cyou
marveloustep.shop
syedlatief.com
comfortableleather.com
alltradescortland.com
dnwgt80508yoec8pzq.top
kedai168ef.com
gelgoodlife.com
nxtskey.com
milliedevine.store
wordcraftart.fun
mpo525.monster
bt365851.com
dogeversetoken.net
boostgrowmode.com
dacapital.net
project21il.com
go4stores.com
brunoduarte.online
sexgodmasterclass.com
wuhey.shop
jdginl892e.xyz
agenkilat-official.space
hacks.digital
suv.xyz
fwbsmg.life
vicmvm649n.top
wbahdfw.icu
creativelyloud.com
merrycleanteam.com
solar-systems-panels-58747.bond
rotaryclubofmukono.com
bethanyumcnola.info
breezafan.com
ny-robotictoys.com
lawyers-br-pt-9390663.fyi
neurasaudi.com
dgccb.com
sayuri-walk.com
gtur.top
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2728-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2864-28-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2412 powershell.exe 2828 powershell.exe -
Deletes itself 1 IoCs
pid Process 2056 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1940 set thread context of 2728 1940 MalwareBazaar.exe 36 PID 2728 set thread context of 1204 2728 MalwareBazaar.exe 21 PID 2864 set thread context of 1204 2864 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2728 MalwareBazaar.exe 2728 MalwareBazaar.exe 2412 powershell.exe 2828 powershell.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe 2864 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2728 MalwareBazaar.exe 2728 MalwareBazaar.exe 2728 MalwareBazaar.exe 2864 svchost.exe 2864 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2728 MalwareBazaar.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 2864 svchost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2412 1940 MalwareBazaar.exe 30 PID 1940 wrote to memory of 2412 1940 MalwareBazaar.exe 30 PID 1940 wrote to memory of 2412 1940 MalwareBazaar.exe 30 PID 1940 wrote to memory of 2412 1940 MalwareBazaar.exe 30 PID 1940 wrote to memory of 2828 1940 MalwareBazaar.exe 32 PID 1940 wrote to memory of 2828 1940 MalwareBazaar.exe 32 PID 1940 wrote to memory of 2828 1940 MalwareBazaar.exe 32 PID 1940 wrote to memory of 2828 1940 MalwareBazaar.exe 32 PID 1940 wrote to memory of 2740 1940 MalwareBazaar.exe 34 PID 1940 wrote to memory of 2740 1940 MalwareBazaar.exe 34 PID 1940 wrote to memory of 2740 1940 MalwareBazaar.exe 34 PID 1940 wrote to memory of 2740 1940 MalwareBazaar.exe 34 PID 1940 wrote to memory of 2728 1940 MalwareBazaar.exe 36 PID 1940 wrote to memory of 2728 1940 MalwareBazaar.exe 36 PID 1940 wrote to memory of 2728 1940 MalwareBazaar.exe 36 PID 1940 wrote to memory of 2728 1940 MalwareBazaar.exe 36 PID 1940 wrote to memory of 2728 1940 MalwareBazaar.exe 36 PID 1940 wrote to memory of 2728 1940 MalwareBazaar.exe 36 PID 1940 wrote to memory of 2728 1940 MalwareBazaar.exe 36 PID 1204 wrote to memory of 2864 1204 Explorer.EXE 37 PID 1204 wrote to memory of 2864 1204 Explorer.EXE 37 PID 1204 wrote to memory of 2864 1204 Explorer.EXE 37 PID 1204 wrote to memory of 2864 1204 Explorer.EXE 37 PID 2864 wrote to memory of 2056 2864 svchost.exe 39 PID 2864 wrote to memory of 2056 2864 svchost.exe 39 PID 2864 wrote to memory of 2056 2864 svchost.exe 39 PID 2864 wrote to memory of 2056 2864 svchost.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dacYzRiJuWECy.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dacYzRiJuWECy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCC25.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD540803061b96c88c183b7fac2858a3e40
SHA1004f8dd27e35c6f578ec3899edb328c6940dca1d
SHA256dffd3fb24f711b0ecdd5223de95371be6a34ffa9e8511a96592f999b12b6f4d8
SHA512b95dbfdaa009ae668d27ef99cb7ef870c5f6281752c5042f44cb338dcf9ac2c77af9f031f779a54fa296124c4480f61b2e18bf4e777e3b5ffe1aec1df7feee2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W0BMVO9DHTG5RTLJYYEM.temp
Filesize7KB
MD57a071e1abde38e2a1dbe563a2dc9d873
SHA12db9b3349e60274305645702f61b76960753b47e
SHA256f4bf51e81f5fa64f59ed4a9df9d8d28047f1b1f7a7e6a8bf4043728a28df3490
SHA512446a3bd861bbb938176f5e0873b38c2d8abb42a11a0ecece435b938b8ded7a140dae3ac48081846b138d12a3872a66662d37061a1cc9046354158f317f8854b4