Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
25-10-2021 19:15
Static task
static1
Behavioral task
behavioral1
Sample
GiecQSs.bin.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
GiecQSs.bin.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
GiecQSs.bin.dll
-
Size
186KB
-
MD5
6bdc157542846873b3ea1854f4e93d76
-
SHA1
b14ed5008108b570ec40c3c2d8390d0efb31cef7
-
SHA256
fd17907d5c330897248b4eeb10b26bd72a1a9d15eb8422c80a4bf17a9eccc24d
-
SHA512
2ecb5c8695e927369e464634d2464e6e6e25f660453b3b6c43b035d883627a57c90ccdc5da467b4b110ff735a445332735ca9413ad0c723fb4a11cbd4d82f045
Score
10/10
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4144 created 2880 4144 regsvr32.exe Explorer.EXE -
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4144-117-0x00000000001D0000-0x0000000000200000-memory.dmp BazarLoaderVar5 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4144 set thread context of 620 4144 regsvr32.exe chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4144 regsvr32.exe 4144 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe PID 4144 wrote to memory of 620 4144 regsvr32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\GiecQSs.bin.dll2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\GiecQSs.bin.dll"1⤵