Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
05-05-2021 22:21
Static task
static1
Behavioral task
behavioral1
Sample
rest.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
rest.exe
Resource
win10v20210408
General
-
Target
rest.exe
-
Size
385KB
-
MD5
96764a0a62e66a147a3d4db0e59a6e34
-
SHA1
1364419833344aa6ab3f301059d43b9506197501
-
SHA256
9663dc275239aa93ceccedae7a0d54e10def18dd177d231264a323a4175a23d4
-
SHA512
71855c2e52c1b65697a6a0843373d2039dc50db4155415dd7c76707870cdf05b1a829145837f3ec10801bdfa79a5dc44afb83b87da78472533394006c8cf38e7
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-66-0x0000000140000000-0x0000000140056000-memory.dmp BazarBackdoorVar3 -
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1920-60-0x0000000000120000-0x0000000000147000-memory.dmp BazarLoaderVar6 behavioral1/memory/1812-63-0x0000000000240000-0x0000000000267000-memory.dmp BazarLoaderVar6 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rest.exedescription pid process target process PID 1920 set thread context of 1640 1920 rest.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rest.exepid process 1920 rest.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rest.exedescription pid process target process PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe PID 1920 wrote to memory of 1640 1920 rest.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rest.exe"C:\Users\Admin\AppData\Local\Temp\rest.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\svchost.exe"svchost"2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\rest.exeC:\Users\Admin\AppData\Local\Temp\rest.exe {3373D0E6-37B7-47CE-86F2-46C46558DE02}1⤵PID:1812
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2455352368-1077083310-2879168483-1000\3e952d0ddb6a308dcd44a8ee28102e55_14c10c19-3a0b-4ef0-8928-af871cb14c00
MD59e2f3eab69ef628ddbf2ef9a4241a69c
SHA111ed46222307a9a2682b111aebd265cdba2ccf1f
SHA2567ae40d85e89d69d1ebed581177a770bedcd8821aca387e2d81b3ba816b541bc9
SHA51208494d29c86aa86ff74c8b66f8322804c46130b4aa476fc277454c13e863c721e825b3d7e17ed440e03deb7821b27a997e88bcd5e790898539cfc31d2bf26fd7