Analysis

  • max time kernel
    51s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12-04-2023 03:51

General

  • Target

    jre-8u351-windows-x64.exe

  • Size

    84.5MB

  • MD5

    7542ec421a2f6e90751e8b64c22e0542

  • SHA1

    d207d221a28ede5c2c8415f82c555989aa7068ba

  • SHA256

    188ca8ecc44de1b7f602e883c3054dc392792c3631bf362b1bc4f3e1dba323e6

  • SHA512

    8987bf8aa1b401815fa9850e56954db6015bdd06ce78b65ba435724582ffa615dee4e1452fa237c53257dca8ee97b469d01c27757a5f070ce6f807a4f81094bc

  • SSDEEP

    1572864:ugyqUvFZpZDQBTgcJ5pWuqHRAOLut/+EDSSXXfDS2ZVw:ugzUnvDHq5pW1xAwutGEDxXXfGP

Score
10/10

Malware Config

Signatures

  • BazarBackdoor

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Bazar/Team9 Backdoor payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jre-8u351-windows-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\jre-8u351-windows-x64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\jds7082445.tmp\jre-8u351-windows-x64.exe
      "C:\Users\Admin\AppData\Local\Temp\jds7082445.tmp\jre-8u351-windows-x64.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jds7082445.tmp\jre-8u351-windows-x64.exe
    Filesize

    84.1MB

    MD5

    dfcfc788d67437530a50177164db42b0

    SHA1

    2d9ed0dc5671a358186dcf83abb74bfe39c40e9f

    SHA256

    a90318bae7d99da633d9cac8ce322120d087e7b6f5eec0d1d0d7f9413fdd4dc1

    SHA512

    dbdfd02528c9f0e506232e8640a8602fade0d05f4139368187300ea2d537e41d2d167655ded30d938bd445a21c776a3c3721f8db4d3f03e3c06807a84cf232e3

  • C:\Users\Admin\AppData\Local\Temp\jds7082445.tmp\jre-8u351-windows-x64.exe
    Filesize

    84.1MB

    MD5

    dfcfc788d67437530a50177164db42b0

    SHA1

    2d9ed0dc5671a358186dcf83abb74bfe39c40e9f

    SHA256

    a90318bae7d99da633d9cac8ce322120d087e7b6f5eec0d1d0d7f9413fdd4dc1

    SHA512

    dbdfd02528c9f0e506232e8640a8602fade0d05f4139368187300ea2d537e41d2d167655ded30d938bd445a21c776a3c3721f8db4d3f03e3c06807a84cf232e3

  • C:\Users\Admin\AppData\Local\Temp\jusched.log
    Filesize

    1KB

    MD5

    691700201195a12bc224c39f1b2e9cc3

    SHA1

    386812029e0c8ea15803c1be43f4cf6fbc3ab0a3

    SHA256

    b22240ba81271326b38577800d0f55834438acd9fb506feb3a03f400d0c0ebf2

    SHA512

    97dfede0359743bf41505c33f9c575b1680556ca33fc3dccfcb47dbba641b3d16aa7828d5d157da425a347833cca752e2dff410b0d929a7f8c95bff90e5e0d66

  • C:\Users\Admin\AppData\Local\Temp\jusched.log
    Filesize

    4KB

    MD5

    682bb3d7010e1f2c735e1c0d1958de06

    SHA1

    296ca0eb769276c0bfaaf9f3cade05ac734df4ae

    SHA256

    bf5c4df24e0da8dbebf1203d11f545c06a50f57110a2d1f4dd0d550f1de80997

    SHA512

    ef4f819ee6fd02d64bf596fdadc423136e2180dd4f8543d987aa8762a31e51f3b506e9cf166fd1a1b12071e844913d39130eeba4ff7ad40efb41579e922c0652

  • C:\Users\Admin\AppData\Local\Temp\jusched.log
    Filesize

    4KB

    MD5

    6b6e7016e23631991177ccfec1b60e50

    SHA1

    5c46d5be468e3e10291dd0d1ceec6cca9cb9494f

    SHA256

    65da5e77e0e68f8e49db95f51821a758ea97b87b10d89fb296c20c5629a8e673

    SHA512

    89a52483a3b29d2e057032a8fc445428392bedfd18b1299b19471967d3b3afc9bba1ce27673c55cabb993b941add216965d58a387b7aec0c762e1e660eaa11d6

  • \Users\Admin\AppData\Local\Temp\jds7082445.tmp\jre-8u351-windows-x64.exe
    Filesize

    84.1MB

    MD5

    dfcfc788d67437530a50177164db42b0

    SHA1

    2d9ed0dc5671a358186dcf83abb74bfe39c40e9f

    SHA256

    a90318bae7d99da633d9cac8ce322120d087e7b6f5eec0d1d0d7f9413fdd4dc1

    SHA512

    dbdfd02528c9f0e506232e8640a8602fade0d05f4139368187300ea2d537e41d2d167655ded30d938bd445a21c776a3c3721f8db4d3f03e3c06807a84cf232e3

  • \Users\Admin\AppData\Local\Temp\jds7082445.tmp\jre-8u351-windows-x64.exe
    Filesize

    84.1MB

    MD5

    dfcfc788d67437530a50177164db42b0

    SHA1

    2d9ed0dc5671a358186dcf83abb74bfe39c40e9f

    SHA256

    a90318bae7d99da633d9cac8ce322120d087e7b6f5eec0d1d0d7f9413fdd4dc1

    SHA512

    dbdfd02528c9f0e506232e8640a8602fade0d05f4139368187300ea2d537e41d2d167655ded30d938bd445a21c776a3c3721f8db4d3f03e3c06807a84cf232e3

  • \Users\Admin\AppData\Local\Temp\jds7082445.tmp\jre-8u351-windows-x64.exe
    Filesize

    84.1MB

    MD5

    dfcfc788d67437530a50177164db42b0

    SHA1

    2d9ed0dc5671a358186dcf83abb74bfe39c40e9f

    SHA256

    a90318bae7d99da633d9cac8ce322120d087e7b6f5eec0d1d0d7f9413fdd4dc1

    SHA512

    dbdfd02528c9f0e506232e8640a8602fade0d05f4139368187300ea2d537e41d2d167655ded30d938bd445a21c776a3c3721f8db4d3f03e3c06807a84cf232e3