Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-11-2020 18:20

General

  • Target

    f4f47c67be61d386e7d757ff89825fa630dd5cc4ed600b5471f9cc18c21e983f.exe

  • Size

    332KB

  • MD5

    1e0ff1a8078820c5c10652e406d51bef

  • SHA1

    e191fdbe58b527301eb4bd244a2258ba1cad0182

  • SHA256

    f4f47c67be61d386e7d757ff89825fa630dd5cc4ed600b5471f9cc18c21e983f

  • SHA512

    eb1a011724b988362aa52bdcb69d2886b736dbbe72fe9e53fa3530eeec6bb4089519896a88af48df8e99c7010930fb84cd33599e57f8477e8748cf5259e428a0

Score
10/10

Malware Config

Signatures

  • BazarBackdoor 1 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4f47c67be61d386e7d757ff89825fa630dd5cc4ed600b5471f9cc18c21e983f.exe
    "C:\Users\Admin\AppData\Local\Temp\f4f47c67be61d386e7d757ff89825fa630dd5cc4ed600b5471f9cc18c21e983f.exe"
    1⤵
    • Modifies system certificate store
    PID:240

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2000-0-0x000007FEF6400000-0x000007FEF667A000-memory.dmp
    Filesize

    2.5MB