Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Bazar

Bazar

Bazar is a downloader and backdoor that has been used since at least April 2020, with infections primarily against professional services, healthcare, manufacturing, IT, logistics and travel companies across the US and Europe.Bazar reportedly has ties toTrickBot campaigns and can be used to deploy additional malware, including ransomware, and to steal sensitive data.[1]

ID: S0534
Associated Software: KEGTAP, Team9, Bazaloader
Type: MALWARE
Platforms: Windows
Contributors: Cybereason Nocturnus, @nocturnus
Version: 2.0
Created: 18 November 2020
Last Modified: 04 December 2023

Associated Software Descriptions

NameDescription
KEGTAP

[2][3]

Team9

[1][4]

Bazaloader

[5]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.001Account Discovery:Local Account

Bazar can identify administrator accounts on an infected host.[4]

.002Account Discovery:Domain Account

Bazar has the ability to identify domain administrator accounts.[4][6]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications.[1][4][7]

EnterpriseT1197BITS Jobs

Bazar has been downloaded via Windows BITS functionality.[4]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Bazar can create or add files to Registry Run Keys to establish persistence.[1][4]

.004Boot or Logon Autostart Execution:Winlogon Helper DLL

Bazar can use Winlogon Helper DLL to establish persistence.[8]

.009Boot or Logon Autostart Execution:Shortcut Modification

Bazar can establish persistence by writing shortcuts to the Windows Startup folder.[1][4]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Bazar can execute a PowerShell script received from C2.[4][3]

.003Command and Scripting Interpreter:Windows Command Shell

Bazar can launch cmd.exe to perform reconnaissance commands.[1][8]

EnterpriseT1005Data from Local System

Bazar can retrieve information from the infected machine.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Bazar can decrypt downloaded payloads.Bazar also resolves strings and other artifacts at runtime.[1][4]

EnterpriseT1482Domain Trust Discovery

Bazar can useNltest tools to obtain information about the domain.[1][4]

EnterpriseT1568.002Dynamic Resolution:Domain Generation Algorithms

Bazar can implement DGA using the current date as a seed variable.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

Bazar can send C2 communications with XOR encryption.[4]

.002Encrypted Channel:Asymmetric Cryptography

Bazar can use TLS in C2 communications.[8]

EnterpriseT1008Fallback Channels

Bazar has the ability to use an alternative C2 server if the primary server fails.[4]

EnterpriseT1083File and Directory Discovery

Bazar can enumerate the victim's desktop.[1][4]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products.[4]

EnterpriseT1070.004Indicator Removal:File Deletion

Bazar can delete its loader using a batch file in the Windows temporary folder.[4]

.009Indicator Removal:Clear Persistence

Bazar's loader can delete scheduled tasks created by a previous instance of the malware.[4]

EnterpriseT1105Ingress Tool Transfer

Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such asCobalt Strike.[1][8][4][3]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

Bazar can create a task named to appear benign.[1]

.005Masquerading:Match Legitimate Resource Name or Location

TheBazar loader has named malicious shortcuts "adobe" and mimicked communications software.[1][4][3]

.007Masquerading:Double File Extension

TheBazar loader has used dual-extension executable files such as PreviewReport.DOC.exe.[1]

EnterpriseT1104Multi-Stage Channels

TheBazar loader is used to download and execute theBazar backdoor.[1][8]

EnterpriseT1106Native API

Bazar can use various APIs to allocate memory and facilitate code execution/injection.[1]

EnterpriseT1135Network Share Discovery

Bazar can enumerate shared drives on the domain.[4]

EnterpriseT1027.002Obfuscated Files or Information:Software Packing

Bazar has a variant with a packed payload.[1][8]

.007Obfuscated Files or Information:Dynamic API Resolution

Bazar can hash then resolve API calls at runtime.[1][4]

.013Obfuscated Files or Information:Encrypted/Encoded File

Bazar has used XOR, RSA2, and RC4 encrypted files.[1][4][3]

EnterpriseT1566.002Phishing:Spearphishing Link

Bazar has been spread via emails with embedded malicious links.[1][8][3]

EnterpriseT1057Process Discovery

Bazar can identity the current process on a compromised host.[1]

EnterpriseT1055Process Injection

Bazar can inject code through callingVirtualAllocExNuma.[1]

.012Process Hollowing

Bazar can inject into a target process including Svchost, Explorer, and cmd using process hollowing.[1][4]

.013Process Doppelgänging

Bazar can inject into a target process using process doppelgänging.[1][4]

EnterpriseT1012Query Registry

Bazar can queryWindows\CurrentVersion\Uninstall for installed applications.[1][4]

EnterpriseT1018Remote System Discovery

Bazar can enumerate remote systems using Net View.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Bazar can create a scheduled task for persistence.[1][4]

EnterpriseT1518Software Discovery

Bazar can query the Registry for installed applications.[1]

.001Security Software Discovery

Bazar can identify the installed antivirus engine.[1]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD.[1]

EnterpriseT1082System Information Discovery

Bazar can fingerprint architecture, computer name, and OS version on the compromised host.Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.[1][4]

EnterpriseT1614.001System Location Discovery:System Language Discovery

Bazar can perform a check to ensure that the operating system's keyboard and language settings are not set to Russian.[4]

EnterpriseT1016System Network Configuration Discovery

Bazar can collect the IP address and NetBIOS name of an infected machine.[1]

EnterpriseT1033System Owner/User Discovery

Bazar can identify the username of the infected user.[4]

EnterpriseT1124System Time Discovery

Bazar can collect the time on the compromised host.[1][4]

EnterpriseT1204.001User Execution:Malicious Link

Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.[1][8][3]

EnterpriseT1497Virtualization/Sandbox Evasion

Bazar can attempt to overload sandbox analysis by sending 1550 calls toprintf.[1]

.003Time Based Checks

Bazar can use a timer to delay execution of core functionality.[4]

EnterpriseT1102Web Service

Bazar downloads have been hosted on Google Docs.[1][8]

EnterpriseT1047Windows Management Instrumentation

Bazar can execute a WMI query to gather information about the installed antivirus engine.[1][6]

Groups That Use This Software

Campaigns

IDNameDescription
C0015C0015

[7]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp