Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-11-2020 19:36
Static task
static1
Behavioral task
behavioral1
Sample
home.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
home.exe
Resource
win10v20201028
General
-
Target
home.exe
-
Size
675KB
-
MD5
7f82baf6acac3e3082e2c22c657e8c0c
-
SHA1
0b950d2be03ca5ab99c81cc629c434e980cd167a
-
SHA256
57b1478167911e633c9480852e6e8e87691c9f8a31201fbd25a70ab42c07808c
-
SHA512
83e1b81eed8656a56c8ff7b9f6e32c03a45e9518b9144d1fe7eda57ecc9898d3dcfeb703d195a4d9e3578ace25085764cf3ce9da68915273fcea0181866e9e61
Malware Config
Signatures
-
BazarBackdoor 6 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 20 https://hotelmonteleone.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 25 https://lukeschicago.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 27 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 28 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 29 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/4 HTTP URL 34 https://ukmedm.com/852b57d84ba48302555ce2a35a1277ce/2 -
Blacklisted process makes network request 7 IoCs
Processes:
cmd.exeflow pid process 20 1536 cmd.exe 22 1536 cmd.exe 25 1536 cmd.exe 27 1536 cmd.exe 28 1536 cmd.exe 29 1536 cmd.exe 34 1536 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
home.exedescription pid process target process PID 1880 set thread context of 1536 1880 home.exe cmd.exe -
Processes:
cmd.exehome.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 home.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 home.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 cmd.exe -
Suspicious use of WriteProcessMemory 852 IoCs
Processes:
home.exedescription pid process target process PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe PID 1880 wrote to memory of 1536 1880 home.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\home.exe"C:\Users\Admin\AppData\Local\Temp\home.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe2⤵
- Blacklisted process makes network request
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\home.exeC:\Users\Admin\AppData\Local\Temp\home.exe 13553202441⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
9cc6068783e4d33b534c10ff1c1c3f00
SHA1b3b8d5f949715772c735ddeaeebd297297855dfb
SHA256b1657e06a4f3115c9ec4a5e2bc698c8f6cd0bcd5e95f9f55c15bb252414bccb0
SHA51263e6b54d00ac1142f6b4ccd31ac085bc1356590fc43ba38a244f127f158888fd5ca1c04b9a24219112e28a822ce25348f1e4e05079f2775c746d6adb699e8ad8
-
memory/868-2-0x000007FEF7810000-0x000007FEF7A8A000-memory.dmpFilesize
2.5MB
-
memory/968-4-0x0000000000380000-0x00000000003AC000-memory.dmpFilesize
176KB
-
memory/1536-5-0x0000000049F70000-0x0000000049FB4000-memory.dmpFilesize
272KB
-
memory/1536-6-0x0000000049F8DA28-mapping.dmp
-
memory/1536-7-0x0000000049F70000-0x0000000049FB4000-memory.dmpFilesize
272KB
-
memory/1880-0-0x0000000001B80000-0x0000000001BAC000-memory.dmpFilesize
176KB
-
memory/1880-1-0x0000000001BB0000-0x0000000001BDC000-memory.dmpFilesize
176KB