Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 11:20

General

  • Target

    09da6102c6b77c609537c5b3d8bf9de8f4143d533856d174929859feda5806fa.exe

  • Size

    332KB

  • MD5

    830b5861063e0d5a94b9b895f5b58fe5

  • SHA1

    26b6a975f3af21eb43986e08b5b5472e6dcbf770

  • SHA256

    09da6102c6b77c609537c5b3d8bf9de8f4143d533856d174929859feda5806fa

  • SHA512

    b8a6f4c9d469cc2b903338deb47758acc7fe92aab8fcc096d3e54cf3ab8134caa62dde9a20e88f05a1a0c6f8645f66d2d34dfdd3571551c66e5b7d8aef7893b8

Score
10/10

Malware Config

Signatures

  • BazarBackdoor 1 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09da6102c6b77c609537c5b3d8bf9de8f4143d533856d174929859feda5806fa.exe
    "C:\Users\Admin\AppData\Local\Temp\09da6102c6b77c609537c5b3d8bf9de8f4143d533856d174929859feda5806fa.exe"
    1⤵
    • Modifies system certificate store
    PID:536

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1920-0-0x000007FEF81B0000-0x000007FEF842A000-memory.dmp
    Filesize

    2.5MB