Analysis

  • max time kernel
    154s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-02-2021 15:51

General

  • Target

    1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe

  • Size

    911KB

  • MD5

    be38d6a99042167ac46211ed057a7c50

  • SHA1

    859902d618afa0a01bafe44d309b5b1420c08286

  • SHA256

    1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328

  • SHA512

    a39ec42109e985222c9e5259b547e6f0ab5cf265e6826c55a6bfc2bd201b39b2a5f0ca140983763f1096208a4a2ea2432689fa414d7d9665d1c6b7dad345b742

Score
8/10

Malware Config

Signatures

  • Tries to connect to .bazar domain 7 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe
    "C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe
      "C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe"
      2⤵
      • Modifies system certificate store
      PID:1832
  • C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe
    C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe 1969713190
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe
      C:\Users\Admin\AppData\Local\Temp\1dda56e38d9187c2f440a838d59474055045bad5791fc75794b1472350e2a328.exe 1969713190
      2⤵
        PID:1624

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/912-10-0x000007FEF77C0000-0x000007FEF7A3A000-memory.dmp

      Filesize

      2.5MB

    • memory/1624-7-0x0000000000410D8F-mapping.dmp

    • memory/1832-2-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/1832-3-0x0000000000410D8F-mapping.dmp

    • memory/1832-4-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/1832-5-0x00000000760A1000-0x00000000760A3000-memory.dmp

      Filesize

      8KB