Bazar is a downloader and backdoor that has been used since at least April 2020, with infections primarily against professional services, healthcare, manufacturing, IT, logistics and travel companies across the US and Europe. Bazar reportedly has ties to TrickBot campaigns and can be used to deploy additional malware, including ransomware, and to steal sensitive data.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1197 | BITS任务 |
Bazar has been downloaded via Windows BITS functionality.[4] |
|
| Enterprise | T1047 | Windows管理规范 |
Bazar can execute a WMI query to gather information about the installed antivirus engine.[1][6] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
Bazar can retrieve information from the infected machine.[1] |
|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service | |
| .005 | 伪装: Match Legitimate Name or Location |
The Bazar loader has named malicious shortcuts "adobe" and mimicked communications software.[1][4][3] |
||
| .007 | 伪装: Double File Extension |
The Bazar loader has used dual-extension executable files such as PreviewReport.DOC.exe.[1] |
||
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| .002 | 加密通道: Asymmetric Cryptography | |||
| Enterprise | T1568 | .002 | 动态解析: Domain Generation Algorithms |
Bazar can implement DGA using the current date as a seed variable.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Bazar can decrypt downloaded payloads. Bazar also resolves strings and other artifacts at runtime.[1][4] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Bazar can create or add files to Registry Run Keys to establish persistence.[1][4] |
| .004 | 启动或登录自动启动执行: Winlogon Helper DLL |
Bazar can use Winlogon Helper DLL to establish persistence.[7] |
||
| .009 | 启动或登录自动启动执行: Shortcut Modification |
Bazar can establish persistence by writing shortcuts to the Windows Startup folder.[1][4] |
||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Bazar can execute a PowerShell script received from C2.[4][3] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Bazar can launch cmd.exe to perform reconnaissance commands.[1][7] |
||
| Enterprise | T1008 | 回退信道 |
Bazar has the ability to use an alternative C2 server if the primary server fails.[4] |
|
| Enterprise | T1482 | 域信任发现 |
Bazar can use Nltest tools to obtain information about the domain.[1][4] |
|
| Enterprise | T1104 | 多阶段信道 |
The Bazar loader is used to download and execute the Bazar backdoor.[1][7] |
|
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products.[4] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications.[1][4][8] |
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1106 | 本机API |
Bazar can use various APIs to allocate memory and facilitate code execution/injection.[1] |
|
| Enterprise | T1012 | 查询注册表 |
Bazar can query |
|
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing | |
| .007 | 混淆文件或信息: Dynamic API Resolution | |||
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs.[1][7][3] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Bazar can delete its loader using a batch file in the Windows temporary folder.[4] |
| .009 | 移除指标: Clear Persistence |
Bazar's loader can delete scheduled tasks created by a previous instance of the malware.[4] |
||
| Enterprise | T1614 | .001 | 系统位置发现: System Language Discovery |
Bazar can perform a check to ensure that the operating system's keyboard and language settings are not set to Russian.[4] |
| Enterprise | T1082 | 系统信息发现 |
Bazar can fingerprint architecture, computer name, and OS version on the compromised host. Bazar can also check if the Russian language is installed on the infected machine and terminate if it is found.[1][4] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1124 | 系统时间发现 | ||
| Enterprise | T1016 | 系统网络配置发现 |
Bazar can collect the IP address and NetBIOS name of an infected machine.[1] |
|
| Enterprise | T1135 | 网络共享发现 | ||
| Enterprise | T1102 | 网络服务 | ||
| Enterprise | T1497 | 虚拟化/沙盒规避 |
Bazar can attempt to overload sandbox analysis by sending 1550 calls to |
|
| .003 | Time Based Evasion |
Bazar can use a timer to delay execution of core functionality.[4] |
||
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Bazar can identify administrator accounts on an infected host.[4] |
| .002 | 账号发现: Domain Account |
Bazar has the ability to identify domain administrator accounts.[4][6] |
||
| Enterprise | T1518 | 软件发现 | ||
| .001 | Security Software Discovery | |||
| Enterprise | T1105 | 输入工具传输 |
Bazar can download and deploy additional payloads, including ransomware and post-exploitation frameworks such as Cobalt Strike.[1][7][4][3] |
|
| Enterprise | T1057 | 进程发现 |
Bazar can identity the current process on a compromised host.[1] |
|
| Enterprise | T1055 | 进程注入 |
Bazar can inject code through calling |
|
| .012 | Process Hollowing |
Bazar can inject into a target process including Svchost, Explorer, and cmd using process hollowing.[1][4] |
||
| .013 | Process Doppelgänging |
Bazar can inject into a target process using process doppelgänging.[1][4] |
||
| Enterprise | T1018 | 远程系统发现 | ||
| Enterprise | T1566 | .002 | 钓鱼: Spearphishing Link |
Bazar has been spread via emails with embedded malicious links.[1][7][3] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task | |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD.[1] |
| ID | Name | References |
|---|---|---|
| G1011 | EXOTIC LILY | |
| G0102 | Wizard Spider |