Analysis

  • max time kernel
    1800s
  • max time network
    1799s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-11-2020 20:49

General

  • Target

    Report-doc.11.03.xlsb

  • Size

    26KB

  • MD5

    9cf051461a704aca7b839964ab2355ab

  • SHA1

    056244cddc082c128df5dda156ac9c1428121e04

  • SHA256

    4fb1df3cc70ff21190e4ce1c6791a0112aba9acd582d1379bc73fcc27e607810

  • SHA512

    ce359920c8fcc6a52683be1b84ef4582900853d4d3b5ca410a929d01f32a47242a1a8a419d435757b45df949fdb2d6392e43aa15eadbb8fa56c82d893bc2e693

Score
10/10

Malware Config

Signatures

  • BazarBackdoor 16 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Blacklisted process makes network request 2003 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 856 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Report-doc.11.03.xlsb
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\fhnhuj\noorox\hypzgqhi.exe
      "C:\fhnhuj\noorox\hypzgqhi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe
        3⤵
        • Blacklisted process makes network request
        • Modifies system certificate store
        PID:1072
  • C:\fhnhuj\noorox\hypzgqhi.exe
    C:\fhnhuj\noorox\hypzgqhi.exe 2463391451
    1⤵
    • Executes dropped EXE
    PID:1648

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    8cf993cb197ae339094ab3ddb565eef5

    SHA1

    a40e4919a1269ed2d8bd1955f6a43f94c208cfd9

    SHA256

    5b478d62430968d84ed5a0fabb570602390ffdcc3062206e8ea73fbc72765fe3

    SHA512

    671dd9d137e8e3c3b04a4827f7b8338d0c94894e9b2a0a85141ca0e5161ef9ae656515a4c0e9fd2bb777f7c9b221dd7e5841b25388c02b0411626035d834da7e

  • C:\fhnhuj\noorox\hypzgqhi.exe
    MD5

    8f62ed60962df60d1d11c6e2a97a3a6e

    SHA1

    d7a80002dba75d642cd05f094110e147541f2058

    SHA256

    df25322be14f617652607a150c806b4ecb3a3317564755518b8100063b58a50e

    SHA512

    3b8b5dcf317eb0a5dd061832fa8bc6eb6b1aa290104423b02c3e9b6cd4a5744c1922010478603b545470f303ee4eb65f17d494a5e222b382cd922a7fd75f7080

  • C:\fhnhuj\noorox\hypzgqhi.exe
    MD5

    8f62ed60962df60d1d11c6e2a97a3a6e

    SHA1

    d7a80002dba75d642cd05f094110e147541f2058

    SHA256

    df25322be14f617652607a150c806b4ecb3a3317564755518b8100063b58a50e

    SHA512

    3b8b5dcf317eb0a5dd061832fa8bc6eb6b1aa290104423b02c3e9b6cd4a5744c1922010478603b545470f303ee4eb65f17d494a5e222b382cd922a7fd75f7080

  • \fhnhuj\noorox\hypzgqhi.exe
    MD5

    8f62ed60962df60d1d11c6e2a97a3a6e

    SHA1

    d7a80002dba75d642cd05f094110e147541f2058

    SHA256

    df25322be14f617652607a150c806b4ecb3a3317564755518b8100063b58a50e

    SHA512

    3b8b5dcf317eb0a5dd061832fa8bc6eb6b1aa290104423b02c3e9b6cd4a5744c1922010478603b545470f303ee4eb65f17d494a5e222b382cd922a7fd75f7080

  • memory/920-2-0x0000000000000000-mapping.dmp
  • memory/920-4-0x0000000001E70000-0x0000000001E9C000-memory.dmp
    Filesize

    176KB

  • memory/920-5-0x0000000001EA0000-0x0000000001ECC000-memory.dmp
    Filesize

    176KB

  • memory/1072-11-0x0000000049F4DA28-mapping.dmp
  • memory/1072-10-0x0000000049F30000-0x0000000049F74000-memory.dmp
    Filesize

    272KB

  • memory/1072-12-0x0000000049F30000-0x0000000049F74000-memory.dmp
    Filesize

    272KB

  • memory/1648-8-0x00000000002B0000-0x00000000002DC000-memory.dmp
    Filesize

    176KB

  • memory/1976-0-0x000007FEF77C0000-0x000007FEF7A3A000-memory.dmp
    Filesize

    2.5MB