Analysis

  • max time kernel
    171s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 16:33

General

  • Target

    28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3.exe

  • Size

    5.7MB

  • MD5

    ba54c9285faa654d9071fa8d2b3a0a84

  • SHA1

    cdb4676ba2cf3cc21c3d7db315552756b4966b45

  • SHA256

    28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3

  • SHA512

    1e726e61fd552e8970c0cc66e13d519fdadb9b6becfdd67788cd131ec0172a174a67e9d9c43aad9f5563684a68b74d1f30aee69869abb6d95ae8a68d10b0ae6d

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 3 IoCs
  • Tries to connect to .bazar domain 33 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3.exe
    "C:\Users\Admin\AppData\Local\Temp\28b313f8a09e2512039b0e5bbfb67af2aee9b461bac9e0a455dbd409b7b621e3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/444-130-0x00000000001A0000-0x00000000001B9000-memory.dmp
    Filesize

    100KB

  • memory/444-134-0x0000000180000000-0x0000000180017000-memory.dmp
    Filesize

    92KB

  • memory/444-138-0x0000000000180000-0x0000000000196000-memory.dmp
    Filesize

    88KB