Analysis
-
max time kernel
119s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-05-2021 15:20
Static task
static1
Behavioral task
behavioral1
Sample
vegas.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
vegas.dll
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
vegas.dll
-
Size
513KB
-
MD5
b80f4b91c29963df1cfd0d0a8a30e5c6
-
SHA1
09c6ae06e0c10672d91f6850118f41dc3dd66e72
-
SHA256
0a87bd3bb60320b21e493341b70519af4e46c2e969038d6d89b536cd37aa11d9
-
SHA512
bdcd3009ed3499055cf73ef1c4dd4bd0942c8b81c395cecf3c9da790e4867055059d10b05451476d7da98bbbf472c40536e7a09158b5de92c57a74e36396d10c
Score
10/10
Malware Config
Signatures
-
BazarBackdoor 5 IoCs
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
Processes:
description flow ioc HTTP URL 23 https://54.163.9.216/4be656f0db4e6d3caa7f96acd7029340/4 HTTP URL 24 https://54.163.9.216/4be656f0db4e6d3caa7f96acd7029340/4 HTTP URL 25 https://54.163.9.216/4be656f0db4e6d3caa7f96acd7029340/4 HTTP URL 26 https://54.163.9.216/4be656f0db4e6d3caa7f96acd7029340/2 HTTP URL 27 https://54.163.9.216/4be656f0db4e6d3caa7f96acd7029340/3 -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.execmd.exeflow pid process 17 3216 rundll32.exe 19 3216 rundll32.exe 22 3216 rundll32.exe 23 1172 cmd.exe 24 1172 cmd.exe 25 1172 cmd.exe 26 1172 cmd.exe 27 1172 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3216 set thread context of 1172 3216 rundll32.exe cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3212 wrote to memory of 3216 3212 rundll32.exe rundll32.exe PID 3212 wrote to memory of 3216 3212 rundll32.exe rundll32.exe PID 3212 wrote to memory of 3216 3212 rundll32.exe rundll32.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe PID 3216 wrote to memory of 1172 3216 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vegas.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vegas.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe3⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\vegas.dll,PluginInit 1083427641⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1172-118-0x0000000000230000-0x000000000026F000-memory.dmpFilesize
252KB
-
memory/1172-119-0x000000000024BB2D-mapping.dmp
-
memory/1172-120-0x0000000000230000-0x000000000026F000-memory.dmpFilesize
252KB
-
memory/3216-114-0x0000000000000000-mapping.dmp
-
memory/3216-115-0x00000000742C0000-0x00000000742E8000-memory.dmpFilesize
160KB
-
memory/3216-116-0x00000000742C0000-0x000000007444C000-memory.dmpFilesize
1.5MB
-
memory/3216-117-0x00000000029F0000-0x00000000029F1000-memory.dmpFilesize
4KB
-
memory/3960-122-0x00000000742C0000-0x000000007444C000-memory.dmpFilesize
1.5MB
-
memory/3960-123-0x0000000003200000-0x000000000334A000-memory.dmpFilesize
1.3MB