Analysis
-
max time kernel
1714s -
max time network
1782s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-11-2020 21:08
Static task
static1
Behavioral task
behavioral1
Sample
efdf344f4fdsdff.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
efdf344f4fdsdff.exe
Resource
win7v20201028
General
-
Target
efdf344f4fdsdff.exe
-
Size
671KB
-
MD5
8f62ed60962df60d1d11c6e2a97a3a6e
-
SHA1
d7a80002dba75d642cd05f094110e147541f2058
-
SHA256
df25322be14f617652607a150c806b4ecb3a3317564755518b8100063b58a50e
-
SHA512
3b8b5dcf317eb0a5dd061832fa8bc6eb6b1aa290104423b02c3e9b6cd4a5744c1922010478603b545470f303ee4eb65f17d494a5e222b382cd922a7fd75f7080
Malware Config
Signatures
-
BazarBackdoor 11 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 45 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/2 HTTP URL 46 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/2 HTTP URL 30 https://hotelmonteleone.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 37 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 38 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 40 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/2 HTTP URL 42 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/2 HTTP URL 44 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/2 HTTP URL 35 https://lukeschicago.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 39 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 41 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/2 -
Blacklisted process makes network request 12 IoCs
Processes:
cmd.exeflow pid process 30 1660 cmd.exe 32 1660 cmd.exe 35 1660 cmd.exe 37 1660 cmd.exe 38 1660 cmd.exe 39 1660 cmd.exe 40 1660 cmd.exe 41 1660 cmd.exe 42 1660 cmd.exe 44 1660 cmd.exe 45 1660 cmd.exe 46 1660 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
efdf344f4fdsdff.exedescription pid process target process PID 1056 set thread context of 1660 1056 efdf344f4fdsdff.exe cmd.exe -
Processes:
efdf344f4fdsdff.execmd.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 efdf344f4fdsdff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 efdf344f4fdsdff.exe -
Suspicious use of WriteProcessMemory 852 IoCs
Processes:
efdf344f4fdsdff.exedescription pid process target process PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe PID 1056 wrote to memory of 1660 1056 efdf344f4fdsdff.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\efdf344f4fdsdff.exe"C:\Users\Admin\AppData\Local\Temp\efdf344f4fdsdff.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe2⤵
- Blacklisted process makes network request
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\efdf344f4fdsdff.exeC:\Users\Admin\AppData\Local\Temp\efdf344f4fdsdff.exe 27283770871⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
2c60f065a829c50cc987ef7809ebe2e4
SHA14b9d7ed6e36d29a1b3bde255b34d5266a3d9ac5e
SHA25631f99d0d2fcfe6aab542163ad375d4222f5b5250bc1f6a6a42bbcfcaa02f3af9
SHA5126b0613086e77b4b2b2b60cea9055f0fd16bda4d0dba5c8cf75a1aab4da0f6fee4eac5e0136f91700de66aa0270ce74b9e743f6bbedf50927bad97a75f86f09da
-
memory/1020-4-0x0000000000380000-0x00000000003AC000-memory.dmpFilesize
176KB
-
memory/1056-0-0x0000000000470000-0x000000000049C000-memory.dmpFilesize
176KB
-
memory/1056-1-0x00000000004A0000-0x00000000004CC000-memory.dmpFilesize
176KB
-
memory/1436-2-0x000007FEF7DF0000-0x000007FEF806A000-memory.dmpFilesize
2.5MB
-
memory/1660-6-0x000000004AB6DA28-mapping.dmp
-
memory/1660-5-0x000000004AB50000-0x000000004AB94000-memory.dmpFilesize
272KB
-
memory/1660-7-0x000000004AB50000-0x000000004AB94000-memory.dmpFilesize
272KB