Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 14:26

General

  • Target

    fc73b896f01eb831e522110ad5c2e8f374d69358faa2386fdece9c17c443ce38.exe

  • Size

    332KB

  • MD5

    a4ceacd31ac62ad74364d4d6d6636b8f

  • SHA1

    65067f308205376e56ec7aa24b9ef3f6d63a56d0

  • SHA256

    fc73b896f01eb831e522110ad5c2e8f374d69358faa2386fdece9c17c443ce38

  • SHA512

    269a5cbe28c0ee1561510cc0a04abd50057453b99977b41517ab2e4d8db302cf1ad9a1263475fb682d15bc672e8fc27a693a4dc19027abeb1517da99c044b237

Score
10/10

Malware Config

Signatures

  • BazarBackdoor 1 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc73b896f01eb831e522110ad5c2e8f374d69358faa2386fdece9c17c443ce38.exe
    "C:\Users\Admin\AppData\Local\Temp\fc73b896f01eb831e522110ad5c2e8f374d69358faa2386fdece9c17c443ce38.exe"
    1⤵
    • Modifies system certificate store
    PID:932

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1996-0-0x000007FEF62E0000-0x000007FEF655A000-memory.dmp
    Filesize

    2.5MB