Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
25-10-2021 17:15
Static task
static1
Behavioral task
behavioral1
Sample
Documents.lnk
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Documents.lnk
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
SharedFiles.dll
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
SharedFiles.dll
Resource
win10-en-20210920
General
-
Target
SharedFiles.dll
-
Size
601KB
-
MD5
adf5dc4ac48443f7042237921620a740
-
SHA1
492528054a7de48cfab7ca982bfd7a5459b3e062
-
SHA256
b60a22be0a21e0a4c52a0fe0fecc2b55205297e1ddafd2364f75b46b8deedb74
-
SHA512
ae629b9181b773a00d6ac74dc2b262fe87995c8f5ae58ae3c3a7b2d7784b99dc382ef41fa02ff35bbdfea76aac638fa7a43b6fc00ea6fdc5b66a1bcca60568ba
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 776 created 1268 776 rundll32.exe Explorer.EXE -
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral3/memory/776-56-0x0000000180001000-0x000000018002E000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 4 776 rundll32.exe 6 776 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 776 set thread context of 1784 776 rundll32.exe chrome.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 776 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exedescription pid process target process PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe PID 776 wrote to memory of 1784 776 rundll32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SharedFiles.dll,#12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\Temp\SharedFiles.dll",#11⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
80292f1e89994ca3b5a7ecf0f5f9838b
SHA1f33973d04ced06a9fcca07080d9414e0e73adcc4
SHA2568f1dbe82a379ed0512dae7e7e98560589288b132c4c9f96ac23c98e04ce023f6
SHA512f7ee3cb9fa84787b958250ff647f5f8081321b0dc88072d6997074906836f2f6aa3b3ccb4a174a5578a2483978e53a1751f50ec806019bb6f2857c48605365e1
-
memory/776-55-0x0000000000130000-0x0000000000157000-memory.dmpFilesize
156KB
-
memory/776-56-0x0000000180001000-0x000000018002E000-memory.dmpFilesize
180KB