Analysis

  • max time kernel
    19s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    20-10-2020 16:48

General

  • Target

    c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5.exe

  • Size

    15.1MB

  • MD5

    e7f0ad7c8740f34c7e8758234852693b

  • SHA1

    1d9335624cae52fa452cb5bf735a447606a617c0

  • SHA256

    c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5

  • SHA512

    b7bdc5dd1feb6a33bbb64f5f5d514126e3d523e7b78927d32207028c64639b56817d7e6661557b2cb62d01bdd40ec18226f0d5f24f8d1b245448a6dba75b4dc9

Score
10/10

Malware Config

Signatures

  • BazarBackdoor 4 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Blacklisted process makes network request 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 1704 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5.exe
    "C:\Users\Admin\AppData\Local\Temp\c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe
      2⤵
      • Blacklisted process makes network request
      PID:1956
  • C:\Users\Admin\AppData\Local\Temp\c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5.exe
    C:\Users\Admin\AppData\Local\Temp\c1a8d92dd4d6a2e51be9be6957c6d0398bef80a667c879c365c622033ea7a8a5.exe 436627563
    1⤵
    • Suspicious use of SetThreadContext
    PID:1964
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe
      2⤵
        PID:1088

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1088-9-0x000000004A69D968-mapping.dmp
    • memory/1248-0-0x00000000012C0000-0x00000000012ED000-memory.dmp
      Filesize

      180KB

    • memory/1248-1-0x0000000140000000-0x000000014002E000-memory.dmp
      Filesize

      184KB

    • memory/1628-2-0x000007FEF7FA0000-0x000007FEF821A000-memory.dmp
      Filesize

      2.5MB

    • memory/1956-3-0x000000004A680000-0x000000004A6C4000-memory.dmp
      Filesize

      272KB

    • memory/1956-4-0x000000004A69D968-mapping.dmp
    • memory/1956-5-0x000000004A680000-0x000000004A6C4000-memory.dmp
      Filesize

      272KB