Analysis
-
max time kernel
600s -
max time network
602s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 21:56
Static task
static1
Behavioral task
behavioral1
Sample
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exe
Resource
win10v2004-20220812-en
General
-
Target
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exe
-
Size
336KB
-
MD5
c6502d4dd27a434167686bfa4d183e89
-
SHA1
bddbceefe4185693ef9015d0a535eb7e034b9ec3
-
SHA256
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780
-
SHA512
e7958bbb238f6e484683e876d42e15ebea04ce00cedb7d377aec77eb008e4389f7e91454d9503ed5558c59c2bfbaf71530c8970e1e3a7ebe032ca8ba699c3ed9
-
SSDEEP
6144:xgITgAwvbsnWEwqVCA1jxlK11wdkWyloi/DyO:xgr/EwSCA1jXK1im/DyO
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-55-0x00000000005E0000-0x00000000005FF000-memory.dmp BazarLoaderVar1 behavioral1/memory/2020-59-0x0000000001BB0000-0x0000000001BCC000-memory.dmp BazarLoaderVar1 behavioral1/memory/2020-63-0x0000000000320000-0x000000000033C000-memory.dmp BazarLoaderVar1 -
Tries to connect to .bazar domain 64 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 257 tyibibel.bazar 494 etcatoel.bazar 500 etcatoel.bazar 515 iqibelud.bazar 681 biidudso.bazar 62 biudsoib.bazar 71 vucaonso.bazar 152 ehekudto.bazar 355 ehsosoto.bazar 356 ehsosoto.bazar 617 ydontoto.bazar 631 ydontoto.bazar 361 ehsosoto.bazar 369 exuhtoto.bazar 679 biidudso.bazar 847 litototo.bazar 119 ehekudud.bazar 348 ehsosoto.bazar 404 owtosoon.bazar 176 exwyonso.bazar 298 tyacudon.bazar 668 biidudso.bazar 476 vuwyudso.bazar 74 vucaonso.bazar 110 ehekudud.bazar 505 etcatoel.bazar 623 ydontoto.bazar 660 extotoib.bazar 97 ehekudud.bazar 400 owtosoon.bazar 819 ydewudud.bazar 186 aqewelib.bazar 245 tyibibel.bazar 309 ehqetoon.bazar 128 ehekudto.bazar 827 ydewudud.bazar 437 tyqeonso.bazar 608 ydontoto.bazar 40 biudsoib.bazar 192 aqewelib.bazar 342 ehsosoto.bazar 740 ufibelel.bazar 203 aqewelib.bazar 255 tyibibel.bazar 268 tyibibel.bazar 273 tyibibel.bazar 282 tyacudon.bazar 341 ehsosoto.bazar 708 tyidibel.bazar 125 ehekudto.bazar 138 ehekudto.bazar 346 ehsosoto.bazar 357 ehsosoto.bazar 839 ydewudud.bazar 254 tyibibel.bazar 343 ehsosoto.bazar 260 tyibibel.bazar 420 owtosoon.bazar 426 tyqeonso.bazar 591 ufeltoso.bazar 78 vucaonso.bazar 359 ehsosoto.bazar 585 ufeltoso.bazar 636 extotoib.bazar -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 5.135.183.146 Destination IP 142.4.205.47 Destination IP 169.239.202.202 Destination IP 45.32.160.206 Destination IP 162.248.241.94 Destination IP 185.121.177.177 Destination IP 96.47.228.108 Destination IP 77.73.68.161 Destination IP 208.67.220.220 Destination IP 5.45.97.127 Destination IP 139.59.23.241 Destination IP 185.164.136.225 Destination IP 5.135.183.146 Destination IP 147.135.185.78 Destination IP 163.172.185.51 Destination IP 172.98.193.42 Destination IP 169.239.202.202 Destination IP 142.4.205.47 Destination IP 94.177.171.127 Destination IP 169.239.202.202 Destination IP 185.164.136.225 Destination IP 45.32.160.206 Destination IP 63.231.92.27 Destination IP 192.99.85.244 Destination IP 89.35.39.64 Destination IP 167.99.153.82 Destination IP 89.35.39.64 Destination IP 96.47.228.108 Destination IP 45.32.160.206 Destination IP 172.104.136.243 Destination IP 63.231.92.27 Destination IP 192.99.85.244 Destination IP 162.248.241.94 Destination IP 167.99.153.82 Destination IP 51.255.211.146 Destination IP 77.73.68.161 Destination IP 5.45.97.127 Destination IP 5.135.183.146 Destination IP 167.99.153.82 Destination IP 172.98.193.42 Destination IP 147.135.185.78 Destination IP 69.164.196.21 Destination IP 89.35.39.64 Destination IP 147.135.185.78 Destination IP 142.4.204.111 Destination IP 63.231.92.27 Destination IP 217.12.210.54 Destination IP 185.121.177.177 Destination IP 142.4.205.47 Destination IP 96.47.228.108 Destination IP 185.121.177.177 Destination IP 45.63.124.65 Destination IP 208.67.220.220 Destination IP 139.59.23.241 Destination IP 185.164.136.225 Destination IP 5.45.97.127 Destination IP 45.32.160.206 Destination IP 51.255.211.146 Destination IP 176.126.70.119 Destination IP 147.135.185.78 Destination IP 172.104.136.243 Destination IP 208.67.222.222 Destination IP 217.12.210.54 Destination IP 94.177.171.127 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exepid process 2020 35683ac5bbcc63eb33d552878d02ff44582161d1ea1ff969b14ea326083ea780.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2020-54-0x000007FEFB581000-0x000007FEFB583000-memory.dmpFilesize
8KB
-
memory/2020-55-0x00000000005E0000-0x00000000005FF000-memory.dmpFilesize
124KB
-
memory/2020-59-0x0000000001BB0000-0x0000000001BCC000-memory.dmpFilesize
112KB
-
memory/2020-63-0x0000000000320000-0x000000000033C000-memory.dmpFilesize
112KB