Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
25-10-2021 17:15
Static task
static1
Behavioral task
behavioral1
Sample
Documents.lnk
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Documents.lnk
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
SharedFiles.dll
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
SharedFiles.dll
Resource
win10-en-20210920
General
-
Target
Documents.lnk
-
Size
1KB
-
MD5
4d8af5ba95aa23f7162b7bbf8622d801
-
SHA1
d5b8c1a219686be5b75e58c560609023b491d9aa
-
SHA256
e87f9f378590b95de1b1ef2aaab84e1d00f210fd6aaf5025d815f33096c9d162
-
SHA512
f64416dbce111afe375efe031b05ed5b5b5c00c956d3c419d733147e4f0e751a60f3a22c72c36d45841abf85013c9647c6dc040cdd3d56c9b8cc35bccfd60d2c
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 984 created 1268 984 rundll32.exe Explorer.EXE -
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/984-58-0x0000000180001000-0x000000018002E000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 4 984 rundll32.exe 6 984 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 984 set thread context of 588 984 rundll32.exe chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 984 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 836 wrote to memory of 984 836 cmd.exe rundll32.exe PID 836 wrote to memory of 984 836 cmd.exe rundll32.exe PID 836 wrote to memory of 984 836 cmd.exe rundll32.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe PID 984 wrote to memory of 588 984 rundll32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Documents.lnk2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" SharedFiles.dll,BasicScore3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\Temp\SharedFiles.dll",BasicScore1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
d87295ee6c7d51f3cd360a9f0f65666d
SHA1195aa22ce180cce58db4ce7556e4de0c6a0c7296
SHA256e306ec7a83845577b8cc60775a0773ac5c101806be1aca639b4349f71349185b
SHA5126030680420dcc03b67720a088552115427ed82b6c796af3ad82b9c757285a31c7ca5f5e3f8275a1d9428ed339c288129b94a4adbd8dace5bd1b2c9c0da1523bb
-
memory/836-55-0x000007FEFC3C1000-0x000007FEFC3C3000-memory.dmpFilesize
8KB
-
memory/984-56-0x0000000000000000-mapping.dmp
-
memory/984-57-0x00000000002B0000-0x00000000002D7000-memory.dmpFilesize
156KB
-
memory/984-58-0x0000000180001000-0x000000018002E000-memory.dmpFilesize
180KB