Analysis

  • max time kernel
    1799s
  • max time network
    1801s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    05-10-2021 20:55

General

  • Target

    accessClean.jpg.dll

  • Size

    697KB

  • MD5

    881b324a90273c109096ad480a147376

  • SHA1

    93e5854614e861693a5d930c132ca4674bf9703d

  • SHA256

    fd191c44be496e249149130aca11cfcc5db336f961c0ea406672c2acb59ca6a0

  • SHA512

    a9658fccd3ad8dd73ed68c208006b4772a2774cd0fa6cf3172f6f2a9d43e23cf9f44b616fc4ef0eff46d1f753c85398747e52954ead82ca81844262708ac5e37

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • Bazar/Team9 Backdoor payload 3 IoCs
  • Bazar/Team9 Loader payload 2 IoCs
  • Tries to connect to .bazar domain 64 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\accessClean.jpg.dll
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup
      2⤵
        PID:3120
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\accessClean.jpg.dll,DllRegisterServer {179DD6C7-64BF-458C-AB10-45DDFBE4B706}
      1⤵
        PID:3728

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QT2UOKDP\8DuoXldd1a[1]

        MD5

        eeebfcc3b7dba60ade87fdb30d96ba70

        SHA1

        1f56c16ccc0680c99f97752537e16f75d2860fba

        SHA256

        039937372f41de224fa2769b08f557af0e3a7b876ec2e26b74a044805a51f98e

        SHA512

        8e9ee0cc3817c1b238c22a87c77a811dd041c15a1d71ff3fd3bd87b9b7951f20e8c1d6302b7fef940994cf79db7835ac0709768e75e12ac0eff6136843e419af

      • memory/3120-117-0x00007FF787B00000-0x00007FF787B4B000-memory.dmp

        Filesize

        300KB

      • memory/3120-118-0x00007FF787B24AB0-mapping.dmp

      • memory/3120-119-0x00007FF787B00000-0x00007FF787B4B000-memory.dmp

        Filesize

        300KB

      • memory/3524-115-0x00000000013F0000-0x0000000001408000-memory.dmp

        Filesize

        96KB

      • memory/3728-116-0x000002BE1D510000-0x000002BE1D528000-memory.dmp

        Filesize

        96KB