Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
22-10-2021 23:48
Static task
static1
Behavioral task
behavioral1
Sample
myLadyYou.hta
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
myLadyYou.hta
Resource
win10-en-20211014
General
-
Target
myLadyYou.hta
-
Size
3KB
-
MD5
c61438c62ed2365acf96666d60693f7f
-
SHA1
fb6a583b20018529b1a582aefed72610ebee0e15
-
SHA256
7000ec866763706f0244525b0951606dd9a18f3acfb338b13cc8b4ef437a814f
-
SHA512
9d11669828022f409f68623a3a29343b11b78d3449b099439f23b1b00785209496776dbae5c7dd310af2306bfb673e9e118dd200a82a7146c51ff716ac694c0c
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1560 created 1252 1560 regsvr32.exe Explorer.EXE -
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1560-63-0x0000000180001000-0x0000000180030000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 5 1604 mshta.exe -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exepid process 1060 regsvr32.exe 1560 regsvr32.exe 1752 regsvr32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1560 set thread context of 1724 1560 regsvr32.exe chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid process 1560 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
mshta.exeregsvr32.exeregsvr32.exedescription pid process target process PID 1604 wrote to memory of 1060 1604 mshta.exe regsvr32.exe PID 1604 wrote to memory of 1060 1604 mshta.exe regsvr32.exe PID 1604 wrote to memory of 1060 1604 mshta.exe regsvr32.exe PID 1604 wrote to memory of 1060 1604 mshta.exe regsvr32.exe PID 1604 wrote to memory of 1060 1604 mshta.exe regsvr32.exe PID 1604 wrote to memory of 1060 1604 mshta.exe regsvr32.exe PID 1604 wrote to memory of 1060 1604 mshta.exe regsvr32.exe PID 1060 wrote to memory of 1560 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1560 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1560 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1560 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1560 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1560 1060 regsvr32.exe regsvr32.exe PID 1060 wrote to memory of 1560 1060 regsvr32.exe regsvr32.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe PID 1560 wrote to memory of 1724 1560 regsvr32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\myLadyYou.hta"2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" c:\users\public\youMySea.jpg3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exec:\users\public\youMySea.jpg4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "c:\users\public\youMySea.jpg"1⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
f2367de7d784190f0d36f1220771036d
SHA1a00b58bd39d52184a523d51b1e9755eb5c90bc4b
SHA2568434f9c98887a64837c57daeea73213ab1b42533bc2030f35e1f360c60a23f7b
SHA5122d10ae81c44b72d80aefee138f34373252423bdf3cd83edbbab88cb0102c412b3a8ee1ddd50fa16647f086b3fb8a3b744f0fb0134896b25c44f5b106e607d056
-
\??\c:\users\public\youMySea.jpgMD5
8b4f5f6d29675254d8569ed9320b7cff
SHA1dacd5aeba998118fbfd322e1bb717a46f146af56
SHA256f34d674e784a36cab9db68591f73f5c0f8dc6503bf8f155de9b6745645a89ddd
SHA5122126cd0f54970c6302619cef2c6df05ddb98b14965c840316161ecde0cf6c4e1f0c75e082396f2084395a4bfd7bbf458145361d029d9751ebded9eaad0b7912c
-
\Users\Public\youMySea.jpgMD5
8b4f5f6d29675254d8569ed9320b7cff
SHA1dacd5aeba998118fbfd322e1bb717a46f146af56
SHA256f34d674e784a36cab9db68591f73f5c0f8dc6503bf8f155de9b6745645a89ddd
SHA5122126cd0f54970c6302619cef2c6df05ddb98b14965c840316161ecde0cf6c4e1f0c75e082396f2084395a4bfd7bbf458145361d029d9751ebded9eaad0b7912c
-
\Users\Public\youMySea.jpgMD5
8b4f5f6d29675254d8569ed9320b7cff
SHA1dacd5aeba998118fbfd322e1bb717a46f146af56
SHA256f34d674e784a36cab9db68591f73f5c0f8dc6503bf8f155de9b6745645a89ddd
SHA5122126cd0f54970c6302619cef2c6df05ddb98b14965c840316161ecde0cf6c4e1f0c75e082396f2084395a4bfd7bbf458145361d029d9751ebded9eaad0b7912c
-
\Users\Public\youMySea.jpgMD5
8b4f5f6d29675254d8569ed9320b7cff
SHA1dacd5aeba998118fbfd322e1bb717a46f146af56
SHA256f34d674e784a36cab9db68591f73f5c0f8dc6503bf8f155de9b6745645a89ddd
SHA5122126cd0f54970c6302619cef2c6df05ddb98b14965c840316161ecde0cf6c4e1f0c75e082396f2084395a4bfd7bbf458145361d029d9751ebded9eaad0b7912c
-
memory/1060-55-0x0000000000000000-mapping.dmp
-
memory/1060-56-0x00000000754A1000-0x00000000754A3000-memory.dmpFilesize
8KB
-
memory/1560-59-0x0000000000000000-mapping.dmp
-
memory/1560-60-0x000007FEFBD11000-0x000007FEFBD13000-memory.dmpFilesize
8KB
-
memory/1560-62-0x00000000002C0000-0x00000000002E9000-memory.dmpFilesize
164KB
-
memory/1560-63-0x0000000180001000-0x0000000180030000-memory.dmpFilesize
188KB