Analysis

  • max time kernel
    136s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    25-10-2021 18:10

General

  • Target

    LtVlkJg.bin.dll

  • Size

    186KB

  • MD5

    e7836b449e9d7ab89817c7f54d5b1700

  • SHA1

    bae8e214ea4080381a8eea88320726a074d120c1

  • SHA256

    1b081afae6c33f87452aac5f1ded863f0229d13ff4b36e67c1d65d3c2d18de6d

  • SHA512

    4084af9c795f720803ba35504b4f9a7884e089deb8ad382479f484dc8677898625f8bd009ac1f31fa96e0459f723d6cea1436f4125beb3071afa0a43ca3b3e53

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Bazar/Team9 Loader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1304
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\LtVlkJg.bin.dll
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1876
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        2⤵
          PID:1084

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1876-55-0x000007FEFC441000-0x000007FEFC443000-memory.dmp
        Filesize

        8KB

      • memory/1876-56-0x00000000001C0000-0x00000000001F0000-memory.dmp
        Filesize

        192KB