Analysis
-
max time kernel
1770s -
max time network
1815s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
08-10-2021 18:07
Static task
static1
Behavioral task
behavioral1
Sample
1.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
1.dll
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Documents.lnk
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
Documents.lnk
Resource
win10v20210408
General
-
Target
1.dll
-
Size
518KB
-
MD5
c0a88d8ea1c610384bc18bfa12407038
-
SHA1
0a3d5e68878afbe4fa9a154c005c9337bdf83faa
-
SHA256
e425d1aebf1de8798b6ce3e55a3767b47fc6678d6d3886dcb48932fd69474de7
-
SHA512
437c3416f8f11afd0ad4368fa8cc2e03ea9d99c718011afcf11c6ff2cc1c2f3156a050bae7d283e70483200cac576dea893b4878f17b2410c8ac8afe25f17685
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1240 created 1196 1240 rundll32.exe Explorer.EXE -
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1240-60-0x0000000000190000-0x00000000001BA000-memory.dmp BazarLoaderVar5 behavioral1/memory/1532-62-0x0000000001C60000-0x0000000001C8A000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 6 1240 rundll32.exe 8 1240 rundll32.exe 9 1240 rundll32.exe 10 1240 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1240 set thread context of 920 1240 rundll32.exe chrome.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1240 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exedescription pid process target process PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe PID 1240 wrote to memory of 920 1240 rundll32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1.dll,#12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\Temp\1.dll",#11⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
ab5c36d10261c173c5896f3478cdc6b7
SHA187ac53810ad125663519e944bc87ded3979cbee4
SHA256f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9
SHA512e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
4cefe7dd6b7ddbac1a61020553df8e4d
SHA1862558efee586d719372b2dd8faf74d8db54436d
SHA25674ce595299d5cf134dffddc19c84e4701eeee32c62c81302c2300117dc7aa49a
SHA512062e029249706e836158fbfd8d775f5bf9c38c0f6f65249257f8992d751a976d96e8393337995f29dbef6e2ecb568b983509b21f19a8d9b8b41440e190b75449
-
memory/1240-60-0x0000000000190000-0x00000000001BA000-memory.dmpFilesize
168KB
-
memory/1268-61-0x000007FEFC391000-0x000007FEFC393000-memory.dmpFilesize
8KB
-
memory/1532-62-0x0000000001C60000-0x0000000001C8A000-memory.dmpFilesize
168KB