Resubmissions

31-10-2021 06:34

211031-hbtpbaffb7 10

29-10-2021 13:36

211029-qwckjaabcq 10

Analysis

  • max time kernel
    3589s
  • max time network
    4515s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    31-10-2021 06:34

General

  • Target

    main.php.dll

  • Size

    329KB

  • MD5

    9c9b58c38841af6f89ff90a746d63cec

  • SHA1

    95481d6dfa4660bd24ac519561269b6fbd4571c1

  • SHA256

    11f3d84aad7131fe124155c9edfceb594649e87de1ee03383f470442d6ed69a1

  • SHA512

    7b32798e4652f05861cdb5e03abb1eeebe4183c4f5411cc73166fc1e31dab37c00104e3cc035b2fc9c8c3300b561c17b9cffccc8af79fbc78ea2b1b1e721b518

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Bazar/Team9 Loader payload 2 IoCs
  • Tries to connect to .bazar domain 64 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3032
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\main.php.dll
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3924
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        2⤵
          PID:1872
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\main.php.dll"
        1⤵
          PID:1108

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1108-116-0x00000000020D0000-0x00000000022E0000-memory.dmp
          Filesize

          2.1MB

        • memory/3924-115-0x0000000002590000-0x00000000027A0000-memory.dmp
          Filesize

          2.1MB