Resubmissions

07-07-2022 12:57

220707-p7ch8sadg7 10

08-05-2022 22:44

220508-2n8tjshfg9 10

Analysis

  • max time kernel
    185s
  • max time network
    214s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 22:44

General

  • Target

    c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74.exe

  • Size

    461KB

  • MD5

    9776a22caf580541c8231e35e06b8423

  • SHA1

    84250f1c3b526a88b260c8d8112cc0e92a7f71fb

  • SHA256

    c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74

  • SHA512

    0e073f7f8b810af8d913fcefe4bff40180b25ddd6f2f78246a831b89eae39ffc7ff2f1398cb4dd22a0e2c95bfc157c78ced9f76a0b0f26353520a33afb2ab537

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor 1 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Bazar/Team9 Loader payload 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74.exe
    "C:\Users\Admin\AppData\Local\Temp\c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:932

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/932-54-0x00000000005B0000-0x00000000005D3000-memory.dmp
    Filesize

    140KB

  • memory/932-58-0x0000000140000000-0x0000000140021000-memory.dmp
    Filesize

    132KB

  • memory/932-62-0x0000000000580000-0x00000000005A1000-memory.dmp
    Filesize

    132KB