Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    08-07-2020 16:57

General

  • Target

    SecuriteInfo.com.A.16433.exe

  • Size

    253KB

  • MD5

    f58843af873716aeee6e9e74ff8918ca

  • SHA1

    8fb3aba6f5610c465e6fa4f87638fc706b2bcf63

  • SHA256

    54c3e01a3dee75c7137c63a25915b7bec1876a8fc65047eff99b97d9ca6cd5c6

  • SHA512

    3dc3413064112266ac303a2691c024c40fb914593e0622cb970ea367b5f03d60a7355f0a37064e5da4369dc4c7e545c7df7272943ffc6007f0cbede2cfafbd19

Score
10/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Executes dropped EXE 1 IoCs
  • BazarBackdoor

    Stealthy backdoor targetting corporate networks, believed to be developed by Trickbot's authors.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.A.16433.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.A.16433.exe"
    1⤵
      PID:1448
    • C:\Windows\system32\cmd.exe
      cmd.exe / c "start "" /b "cmd.exe" /c "copy /y "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.A.16433.exe" "C:\Users\Admin\AppData\Local\Temp\rtynplnp.exe"&&start "" /b "C:\Users\Admin\AppData\Local\Temp\rtynplnp.exe" -z {20F00099-19EE-4E23-BE8B-3E77BBF6151E}&&exit 0""
      1⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Local\Temp\rtynplnp.exe
        "C:\Users\Admin\AppData\Local\Temp\rtynplnp.exe" -z {20F00099-19EE-4E23-BE8B-3E77BBF6151E}
        2⤵
        • Executes dropped EXE
        PID:1584

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rtynplnp.exe
    • \Users\Admin\AppData\Local\Temp\rtynplnp.exe
    • \Users\Admin\AppData\Local\Temp\rtynplnp.exe
    • memory/1448-0-0x00000000001F0000-0x0000000000211000-memory.dmp
      Filesize

      132KB

    • memory/1584-3-0x0000000000000000-mapping.dmp
    • memory/1584-4-0x0000000000000000-mapping.dmp
    • memory/1584-6-0x0000000000410000-0x0000000000431000-memory.dmp
      Filesize

      132KB