Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7 -
submitted
10-09-2020 08:49
Static task
static1
Behavioral task
behavioral1
Sample
1ae793fb1d53cf5b1b393c348592220eec76d6def504dcb09f4686920d2e28d2.exe
Resource
win7
Behavioral task
behavioral2
Sample
1ae793fb1d53cf5b1b393c348592220eec76d6def504dcb09f4686920d2e28d2.exe
Resource
win10v200722
General
-
Target
1ae793fb1d53cf5b1b393c348592220eec76d6def504dcb09f4686920d2e28d2.exe
-
Size
332KB
-
MD5
a41429f7dbecfb76e6b7534afbeb4f74
-
SHA1
68f48d169b4f62189b3e43c3615aa7e4314e9459
-
SHA256
1ae793fb1d53cf5b1b393c348592220eec76d6def504dcb09f4686920d2e28d2
-
SHA512
6957ba5090a5e36feec28fb5d4abeab7ec068ceb212bc7b3f2a10ac568f80b4a925e5d9b0815fc9e936897924c51d9c51fa1af35da508b2d6e0a179c26797bf6
Malware Config
Signatures
-
Bazar Loader 4 IoCs
Detected loader normally used to deploy BazarBackdoor malware.
Processes:
1ae793fb1d53cf5b1b393c348592220eec76d6def504dcb09f4686920d2e28d2.exedescription flow ioc HTTP URL 4 https://164.132.76.76/api/v138 Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\SystemCertificates\My 1ae793fb1d53cf5b1b393c348592220eec76d6def504dcb09f4686920d2e28d2.exe HTTP URL 7 https://164.132.76.76/api/v138 HTTP URL 8 https://164.132.76.76/api/v138 -
Tries to connect to .bazar domain 3 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
description flow ioc HTTP URL 4 https://164.132.76.76/api/v138 HTTP URL 7 https://164.132.76.76/api/v138 HTTP URL 8 https://164.132.76.76/api/v138