Analysis
-
max time kernel
35s -
max time network
99s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-11-2020 06:05
Static task
static1
Behavioral task
behavioral1
Sample
8f62ed60962df60d1d11c6e2a97a3a6e.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8f62ed60962df60d1d11c6e2a97a3a6e.exe
Resource
win10v20201028
General
-
Target
8f62ed60962df60d1d11c6e2a97a3a6e.exe
-
Size
671KB
-
MD5
8f62ed60962df60d1d11c6e2a97a3a6e
-
SHA1
d7a80002dba75d642cd05f094110e147541f2058
-
SHA256
df25322be14f617652607a150c806b4ecb3a3317564755518b8100063b58a50e
-
SHA512
3b8b5dcf317eb0a5dd061832fa8bc6eb6b1aa290104423b02c3e9b6cd4a5744c1922010478603b545470f303ee4eb65f17d494a5e222b382cd922a7fd75f7080
Malware Config
Signatures
-
BazarBackdoor 6 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 18 https://hotelmonteleone.com/72c5e676b29f5ec54d226eb16133c4da/4 HTTP URL 23 https://lukeschicago.com/72c5e676b29f5ec54d226eb16133c4da/4 HTTP URL 25 https://ukmedm.com/72c5e676b29f5ec54d226eb16133c4da/4 HTTP URL 26 https://ukmedm.com/72c5e676b29f5ec54d226eb16133c4da/4 HTTP URL 27 https://ukmedm.com/72c5e676b29f5ec54d226eb16133c4da/4 HTTP URL 28 https://ukmedm.com/72c5e676b29f5ec54d226eb16133c4da/2 -
Blacklisted process makes network request 7 IoCs
Processes:
cmd.exeflow pid process 18 1464 cmd.exe 20 1464 cmd.exe 23 1464 cmd.exe 25 1464 cmd.exe 26 1464 cmd.exe 27 1464 cmd.exe 28 1464 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8f62ed60962df60d1d11c6e2a97a3a6e.exedescription pid process target process PID 292 set thread context of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe -
Processes:
8f62ed60962df60d1d11c6e2a97a3a6e.execmd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 8f62ed60962df60d1d11c6e2a97a3a6e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 8f62ed60962df60d1d11c6e2a97a3a6e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e cmd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e cmd.exe -
Suspicious use of WriteProcessMemory 852 IoCs
Processes:
8f62ed60962df60d1d11c6e2a97a3a6e.exedescription pid process target process PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 292 wrote to memory of 1464 292 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exe"C:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe2⤵
- Blacklisted process makes network request
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exeC:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exe 42499069501⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
123c64605428a62414c7b4db92133241
SHA190d73aef9cf4a1f3a27cd4ba9c01b67d0939114b
SHA2566b472aba58cdcd7c2439c38722b2764f6a1161d377e1dd6657e7b7ef2d1f002d
SHA5121bea002ee0ee061dd767de482047552d8e8c4ec8d6c56831e70891fbe31c5e85ec8db5f680b15aa56ecd30988a1f324a59c349c9e3ccf0941255ea22fb57d845
-
memory/292-1-0x00000000004A0000-0x00000000004CC000-memory.dmpFilesize
176KB
-
memory/292-0-0x0000000000470000-0x000000000049C000-memory.dmpFilesize
176KB
-
memory/332-4-0x0000000001BD0000-0x0000000001BFC000-memory.dmpFilesize
176KB
-
memory/1216-2-0x000007FEF6580000-0x000007FEF67FA000-memory.dmpFilesize
2.5MB
-
memory/1464-5-0x000000004A290000-0x000000004A2D4000-memory.dmpFilesize
272KB
-
memory/1464-6-0x000000004A2ADA28-mapping.dmp
-
memory/1464-7-0x000000004A290000-0x000000004A2D4000-memory.dmpFilesize
272KB