Analysis

  • max time kernel
    188s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 16:33

General

  • Target

    28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3.exe

  • Size

    5.7MB

  • MD5

    ba54c9285faa654d9071fa8d2b3a0a84

  • SHA1

    cdb4676ba2cf3cc21c3d7db315552756b4966b45

  • SHA256

    28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3

  • SHA512

    1e726e61fd552e8970c0cc66e13d519fdadb9b6becfdd67788cd131ec0172a174a67e9d9c43aad9f5563684a68b74d1f30aee69869abb6d95ae8a68d10b0ae6d

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 3 IoCs
  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3.exe
    "C:\Users\Admin\AppData\Local\Temp\28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/964-54-0x00000000008F0000-0x0000000000909000-memory.dmp
    Filesize

    100KB

  • memory/964-58-0x0000000180000000-0x0000000180017000-memory.dmp
    Filesize

    92KB

  • memory/964-62-0x00000000008D0000-0x00000000008E6000-memory.dmp
    Filesize

    88KB