Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 14:07

General

  • Target

    dbe15556f3ead1477d262e504d1e9c63346ef7f4b368eaa7f9b9ec41ee24a91b.exe

  • Size

    138KB

  • MD5

    f8a6a57565e96f36ad837adbc5e134b9

  • SHA1

    f3a749602f84db021888f2c4dda1d2221697c9b0

  • SHA256

    dbe15556f3ead1477d262e504d1e9c63346ef7f4b368eaa7f9b9ec41ee24a91b

  • SHA512

    bebbddf4143faadd2f40377bde2bd3044b30132dcea6b47b791db6a98e5af431205243652d6bf51a3d08e5a59421c09aef03978eaa34e4dcba0390a787b2e588

Score
10/10

Malware Config

Signatures

  • BazarBackdoor 1 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Tries to connect to .bazar domain 64 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbe15556f3ead1477d262e504d1e9c63346ef7f4b368eaa7f9b9ec41ee24a91b.exe
    "C:\Users\Admin\AppData\Local\Temp\dbe15556f3ead1477d262e504d1e9c63346ef7f4b368eaa7f9b9ec41ee24a91b.exe"
    1⤵
    • Modifies system certificate store
    PID:932

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads