Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240704-en
General
-
Target
MalwareBazaar.exe
-
Size
633KB
-
MD5
04aad3880cdd785ac57270d136b4ae5d
-
SHA1
889ee3a18eb2e035668acc707cff787fea501734
-
SHA256
b1f7d45bb000c3201af5c92b009519206fd4bd83b568f0d360b8603520dc5334
-
SHA512
1e0b7f42b820a6cbfabfe9e0e7aa63787e7286bf94308df47dc4f049b424347507b4744d89d0d1cb5ce5f60fc59ea1661f597e3b89290786cc30c9fb1b2dd5a4
-
SSDEEP
12288:WUFzK9EHj+5YySzHAOZiUUt70/5FUNcLz5LqR3CF/m4fkn:ZzK9EHjuYySzgOBSQLUNcpelCQckn
Malware Config
Extracted
formbook
4.1
ps15
57797.asia
jhpwt.net
basketballdrillsforkids.com
zgzf6.rest
casinomaxnodepositbonus.icu
uptocryptonews.com
gomenasorry.com
fortanix.space
stripscity.xyz
genbotdiy.xyz
mayson-wedding.com
neb-hub.net
seancollinsmusic.com
migraine-treatment-57211.bond
prosperawoman.info
tradefairleads.tech
xn--yeminlitercme-6ob.com
xwaveevent.com
fashiontrendshub.xyz
window-replacement-80823.bond
simplesculpt.online
ellipsive.com
urbandollsllc.com
kgwcmx.xyz
marabudigital.online
abcblindcompany.com
seraphmovement.com
overrideapp.com
holistichealthviews.com
lovemyhome.online
mullermachinery.com
packsperfeitas.shop
gmgex1.com
jlk168.com
xyz-hd.xyz
happysmall.online
phwin777.vip
market-pam.com
kling-ai.xyz
kaidifeiniroo.net
822963429.xyz
bet4win99.com
ryuk-studio.com
tricianihaonewyork.net
plasoi.xyz
mi006.com
briefout.cloud
urbangrowcity.fun
yrund.asia
morningritualtemplate.com
eehuvvqj.xyz
flymgl.com
ux75.top
bluemarblen5d.com
trezorsuite.net
thepeacedealers.com
harlemshake-burgers.com
thesvacha.com
usdj.xyz
stdaev.com
your-coffee-to-talk.com
passrmale.com
resmierabaru20.shop
window-replacement-22581.bond
33pgaaa.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2040-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2040-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2868-24-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2736 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2172 set thread context of 2040 2172 MalwareBazaar.exe 32 PID 2040 set thread context of 1188 2040 MalwareBazaar.exe 21 PID 2868 set thread context of 1188 2868 NAPSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2172 MalwareBazaar.exe 2172 MalwareBazaar.exe 2040 MalwareBazaar.exe 2040 MalwareBazaar.exe 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2040 MalwareBazaar.exe 2040 MalwareBazaar.exe 2040 MalwareBazaar.exe 2868 NAPSTAT.EXE 2868 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2172 MalwareBazaar.exe Token: SeDebugPrivilege 2040 MalwareBazaar.exe Token: SeDebugPrivilege 2868 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2508 2172 MalwareBazaar.exe 31 PID 2172 wrote to memory of 2508 2172 MalwareBazaar.exe 31 PID 2172 wrote to memory of 2508 2172 MalwareBazaar.exe 31 PID 2172 wrote to memory of 2508 2172 MalwareBazaar.exe 31 PID 2172 wrote to memory of 2040 2172 MalwareBazaar.exe 32 PID 2172 wrote to memory of 2040 2172 MalwareBazaar.exe 32 PID 2172 wrote to memory of 2040 2172 MalwareBazaar.exe 32 PID 2172 wrote to memory of 2040 2172 MalwareBazaar.exe 32 PID 2172 wrote to memory of 2040 2172 MalwareBazaar.exe 32 PID 2172 wrote to memory of 2040 2172 MalwareBazaar.exe 32 PID 2172 wrote to memory of 2040 2172 MalwareBazaar.exe 32 PID 1188 wrote to memory of 2868 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2868 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2868 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2868 1188 Explorer.EXE 33 PID 2868 wrote to memory of 2736 2868 NAPSTAT.EXE 34 PID 2868 wrote to memory of 2736 2868 NAPSTAT.EXE 34 PID 2868 wrote to memory of 2736 2868 NAPSTAT.EXE 34 PID 2868 wrote to memory of 2736 2868 NAPSTAT.EXE 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2736
-
-