Analysis
-
max time kernel
127s -
max time network
127s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
10-09-2020 08:49
Static task
static1
Behavioral task
behavioral1
Sample
8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe
Resource
win7
Behavioral task
behavioral2
Sample
8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe
Resource
win10v200722
General
-
Target
8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe
-
Size
365KB
-
MD5
5f64cc672ea13388797599b40a62d9be
-
SHA1
82523c8c89c052c7bda11b1ad0bf27affd26e906
-
SHA256
8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4
-
SHA512
3c22f98b26826024e378e0e8cf148641d0b1b1d119a97f574ce6fbcd83e4b54b685bb72be1193c1a7b860b34480e88ed1a4ff64af9cc1bafad58e1d6d4ff5cfb
Malware Config
Signatures
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3120-11-0x0000000140000000-0x0000000140040000-memory.dmp BazarBackdoorVar4 behavioral2/memory/3120-12-0x0000000140017F2C-mapping.dmp BazarBackdoorVar4 behavioral2/memory/3120-13-0x0000000140000000-0x0000000140040000-memory.dmp BazarBackdoorVar4 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exedescription pid process target process PID 3888 set thread context of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 0a87ba816087d601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exepid process 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 344 svchost.exe Token: SeCreatePagefilePrivilege 344 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exedescription pid process target process PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe PID 3888 wrote to memory of 3120 3888 8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe"C:\Users\Admin\AppData\Local\Temp\8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SYSTEM32\cmd.exe"cmd"2⤵PID:3120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:344
-
C:\Users\Admin\AppData\Local\Temp\8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe"C:\Users\Admin\AppData\Local\Temp\8320e50369b6d17c6d939347fa762213b491ffed93aa5b54d7fc5e4ad8fbf4d4.exe" -r {1C030430-7C4D-4B1A-A15A-083CE4F3D952}1⤵PID:3824