Resubmissions
16-03-2022 10:58
220316-m219ascgd6 1016-09-2021 14:03
210916-rc1npagdel 1015-09-2021 23:08
210915-24mw1sbeb5 1Analysis
-
max time kernel
153s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-03-2022 10:58
Static task
static1
Behavioral task
behavioral1
Sample
DialogGL.exe
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DialogGL.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
DialogGL.exe
-
Size
224KB
-
MD5
3e494cf9a64f6836638f8f99d4015d5b
-
SHA1
de1d042453c77ba66bb9993c40245fd493fcb679
-
SHA256
1625a3baefca74d244796f8ba85972350fda0994cf6752ac4d8ea8ff93052f42
-
SHA512
e2db480175db189de53d35fe6a2318f9ccafec0ca709efa35d38444f52ab1a4db60a7ce9f4414131ee478dd262c50d904eec5eaf6fbd98b2ca2e95c590c89dee
Score
10/10
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4804-130-0x0000000002740000-0x0000000002754000-memory.dmp BazarLoaderVar1 behavioral2/memory/4804-134-0x0000000002760000-0x0000000002776000-memory.dmp BazarLoaderVar1 behavioral2/memory/4804-143-0x0000000002720000-0x0000000002731000-memory.dmp BazarLoaderVar1 behavioral2/memory/2932-147-0x00000000025E0000-0x00000000025F4000-memory.dmp BazarLoaderVar1 behavioral2/memory/2932-151-0x0000000002600000-0x0000000002616000-memory.dmp BazarLoaderVar1 -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DialogGL.exeDialogGL.exepid Process 4804 DialogGL.exe 4804 DialogGL.exe 2932 DialogGL.exe 2932 DialogGL.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
svchost.exedescription pid Process procid_target PID 1208 wrote to memory of 2932 1208 svchost.exe 81 PID 1208 wrote to memory of 2932 1208 svchost.exe 81 PID 1208 wrote to memory of 2932 1208 svchost.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\DialogGL.exe"C:\Users\Admin\AppData\Local\Temp\DialogGL.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\DialogGL.exeC:\Users\Admin\AppData\Local\Temp\DialogGL.exe {83A6B6AD-FE39-416B-A38C-26563DFCF806}2⤵
- Suspicious use of SetWindowsHookEx
PID:2932
-