Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    10-09-2020 08:49

General

  • Target

    8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe

  • Size

    365KB

  • MD5

    5f64cc672ea13388797599b40a62d9be

  • SHA1

    82523c8c89c052c7bda11b1ad0bf27affd26e906

  • SHA256

    8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4

  • SHA512

    3c22f98b26826024e378e0e8cf148641d0b1b1d119a97f574ce6fbcd83e4b54b685bb72be1193c1a7b860b34480e88ed1a4ff64af9cc1bafad58e1d6d4ff5cfb

Malware Config

Signatures

  • Bazar Loader 12 IoCs

    Detected loader normally used to deploy BazarBackdoor malware.

  • Tries to connect to .bazar domain 11 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe
    "C:\Users\Admin\AppData\Local\Temp\8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe"
    1⤵
    • Bazar Loader
    PID:1448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1448-0-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/1448-1-0x0000000140000000-0x0000000140021000-memory.dmp

    Filesize

    132KB