Analysis
-
max time kernel
1644s -
max time network
1813s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 13:57
Static task
static1
Behavioral task
behavioral1
Sample
zas6.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
zas6.dll
Resource
win10-en-20210920
General
-
Target
zas6.dll
-
Size
341KB
-
MD5
b3006622f08bfedeb4f5abaf7f88bfd8
-
SHA1
f80ff6d37a5de8eb8715f00bf7db677e647a53ca
-
SHA256
c1e98cb060bcffb391acc2bf84048ced69cadbe39c4cc65fa4ff793547fed232
-
SHA512
046450b3a0e28bef598ea57cdfca80e85381a7d8be3fd9f007998be327f85095d61da4d8482675c9a10257d64521fbab98973db9cc5e049e8f8e6965a74af07d
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3712 created 2872 3712 regsvr32.exe Explorer.EXE -
suricata: ET MALWARE BazaLoader Activity (GET)
suricata: ET MALWARE BazaLoader Activity (GET)
-
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3712-115-0x0000000002B70000-0x0000000002D96000-memory.dmp BazarLoaderVar5 behavioral2/memory/1520-116-0x0000000002B90000-0x0000000002DB6000-memory.dmp BazarLoaderVar5 -
Tries to connect to .bazar domain 1 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 54 blackrain15.bazar -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3712 set thread context of 1680 3712 regsvr32.exe chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 3712 regsvr32.exe 3712 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe PID 3712 wrote to memory of 1680 3712 regsvr32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\zas6.dll2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\zas6.dll"1⤵