Resubmissions

07-07-2022 12:57

220707-p7ch8sadg7 10

08-05-2022 22:44

220508-2n8tjshfg9 10

Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 12:57

General

  • Target

    c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74.exe

  • Size

    461KB

  • MD5

    9776a22caf580541c8231e35e06b8423

  • SHA1

    84250f1c3b526a88b260c8d8112cc0e92a7f71fb

  • SHA256

    c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74

  • SHA512

    0e073f7f8b810af8d913fcefe4bff40180b25ddd6f2f78246a831b89eae39ffc7ff2f1398cb4dd22a0e2c95bfc157c78ced9f76a0b0f26353520a33afb2ab537

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor 2 IoCs

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Bazar/Team9 Loader payload 3 IoCs
  • Unexpected DNS network traffic destination 35 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74.exe
    "C:\Users\Admin\AppData\Local\Temp\c68fec389bc0d74b7d1d26ec422cfe59c082cbf961a411abcdba31ed4a6cdb74.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1712

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1712-54-0x0000000000350000-0x0000000000373000-memory.dmp
    Filesize

    140KB

  • memory/1712-58-0x0000000140000000-0x0000000140021000-memory.dmp
    Filesize

    132KB

  • memory/1712-62-0x0000000000310000-0x0000000000331000-memory.dmp
    Filesize

    132KB