Resubmissions

03/02/2025, 21:57

250203-1t5hmsvmat 10

03/02/2025, 04:37

250203-e896saslgn 10

31/01/2025, 18:35

250131-w8gmxatmc1 10

Analysis

  • max time kernel
    899s
  • max time network
    542s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03/02/2025, 04:37

General

  • Target

    bazaar.2020.02/HEUR-Backdoor.MSIL.Revenge.exe

  • Size

    16KB

  • MD5

    fc8f4e31d85e796c1efe9b0fabeed23a

  • SHA1

    e15233a69c32761d8ad0e293ce1ed2e1162d5647

  • SHA256

    c35e3bdf0d1a7275e73f3c8c9fb57cf874ffa19ffafae649025b1e90cd07c096

  • SHA512

    36e40d94711c82fb1669e3143d63833a3f7ad1b0ea8dae00287cbcdfd154135a3d7042702e4900193d0dcae94b0d03f7b6a9fb545e20c709fd4fb4a1cae95351

  • SSDEEP

    384:sxF6Mj9VnRq2Rj9oM+bYO+4kr9oDPlMNcLlb5sVKdyS5Ct:sxF6Mj9V5bDclMNE9o

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Backdoor.MSIL.Revenge.exe
    "C:\Users\Admin\AppData\Local\Temp\bazaar.2020.02\HEUR-Backdoor.MSIL.Revenge.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4084
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:5068

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4084-0-0x00007FFB79B25000-0x00007FFB79B26000-memory.dmp

      Filesize

      4KB

    • memory/4084-2-0x000000001C270000-0x000000001C73E000-memory.dmp

      Filesize

      4.8MB

    • memory/4084-1-0x00007FFB79870000-0x00007FFB7A211000-memory.dmp

      Filesize

      9.6MB

    • memory/4084-3-0x000000001BC20000-0x000000001BCC6000-memory.dmp

      Filesize

      664KB

    • memory/4084-4-0x000000001C7B0000-0x000000001C812000-memory.dmp

      Filesize

      392KB

    • memory/4084-5-0x00007FFB79870000-0x00007FFB7A211000-memory.dmp

      Filesize

      9.6MB

    • memory/4084-6-0x00007FFB79B25000-0x00007FFB79B26000-memory.dmp

      Filesize

      4KB

    • memory/4084-7-0x00007FFB79870000-0x00007FFB7A211000-memory.dmp

      Filesize

      9.6MB