Analysis

  • max time kernel
    4294212s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    19-03-2022 23:46

General

  • Target

    56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2.exe

  • Size

    573KB

  • MD5

    ee85e8c0956d2021732d9606120401f9

  • SHA1

    23199f07804d05a120e43b1930c910b1961d1ce6

  • SHA256

    56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2

  • SHA512

    321d4d43ce87c6ac7612698190f664d7c96018884d2e1b5a30710c9106afbe4ea2d9720ad4eb80941a752c397945e67062d5f218019ef4f1b329bd2bea6275cc

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Bazar/Team9 Backdoor payload 3 IoCs
  • Bazar/Team9 Loader payload 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2.exe
    "C:\Users\Admin\AppData\Local\Temp\56c5bee33c17a453c900725f88efb0466fd928072c420955fa599b518b9dfcd2.exe"
    1⤵
      PID:1680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1680-54-0x000007FEF6691000-0x000007FEF6693000-memory.dmp
      Filesize

      8KB

    • memory/1680-55-0x0000000001E30000-0x0000000001E89000-memory.dmp
      Filesize

      356KB

    • memory/1680-59-0x0000000002220000-0x0000000002278000-memory.dmp
      Filesize

      352KB

    • memory/1680-64-0x0000000000430000-0x0000000000486000-memory.dmp
      Filesize

      344KB