Analysis
-
max time kernel
128s -
max time network
136s -
platform
windows7_x64 -
resource
win7 -
submitted
14/10/2020, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
1 (8).exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1 (8).exe
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
1 (8).exe
-
Size
2.1MB
-
MD5
dbdb5ddd07075b5b607460ea441cea19
-
SHA1
895d84fc6015a9ad8d1507a99fb44350fb462c79
-
SHA256
a3b2528b5e31ab1b82e68247a90ddce9a1237b2994ec739beb096f71d58e3d5b
-
SHA512
1a6fb46dacc4a73d1b044a910a49c718fdaa2db6594df151109afb5ba6fadbd719874c447e7fe5607fc462c6ee7235985a1e9ed8b95a0b60c623f2c74e85f432
Score
10/10
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 1 IoCs
resource yara_rule behavioral1/memory/1936-2-0x0000000140000000-0x0000000140043000-memory.dmp BazarBackdoorVar4 -
Bazar/Team9 Loader payload 2 IoCs
resource yara_rule behavioral1/memory/1440-0-0x0000000000730000-0x0000000000778000-memory.dmp BazarLoaderVar4 behavioral1/memory/1440-1-0x0000000180000000-0x000000018004D000-memory.dmp BazarLoaderVar4 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1440 set thread context of 1936 1440 1 (8).exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1440 1 (8).exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28 PID 1440 wrote to memory of 1936 1440 1 (8).exe 28