Resubmissions

01-11-2021 12:31

211101-pp5r3ahha4 10

31-10-2021 09:03

211031-k1bwxacfaq 10

14-10-2021 01:44

211014-b6aflafeg4 10

Analysis

  • max time kernel
    3815s
  • max time network
    3815s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    31-10-2021 09:03

General

  • Target

    c5d2f0da18fb33a25b53fd8b9b98f0bfa95458e3c0feb687852f469167a0110c.dll

  • Size

    359KB

  • MD5

    b2c85051f93825721307c34cd0f0cb34

  • SHA1

    ca3a01d833dafaef66c2614dc3039f9c2a376229

  • SHA256

    c5d2f0da18fb33a25b53fd8b9b98f0bfa95458e3c0feb687852f469167a0110c

  • SHA512

    490a972e0bcbb88011829e0834c2f2dc163c91d9f078755413dd88eb48580f8adb37b7fdc20264f2e642c58e07ff2f7503f47ec05c152839d31954b22e869377

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • suricata: ET MALWARE BazaLoader Activity (GET)

    suricata: ET MALWARE BazaLoader Activity (GET)

  • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

  • Bazar/Team9 Loader payload 3 IoCs
  • Tries to connect to .bazar domain 56 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2808
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c5d2f0da18fb33a25b53fd8b9b98f0bfa95458e3c0feb687852f469167a0110c.dll
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3768
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        2⤵
          PID:3816
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\c5d2f0da18fb33a25b53fd8b9b98f0bfa95458e3c0feb687852f469167a0110c.dll"
        1⤵
          PID:1432
        • C:\Windows\system32\regsvr32.exe
          regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\c5d2f0da18fb33a25b53fd8b9b98f0bfa95458e3c0feb687852f469167a0110c.dll"
          1⤵
            PID:1900

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1432-119-0x0000000000CF0000-0x0000000000D1C000-memory.dmp
            Filesize

            176KB

          • memory/1900-120-0x00000000001C0000-0x00000000001EC000-memory.dmp
            Filesize

            176KB

          • memory/3768-118-0x0000000000BA0000-0x0000000000BCC000-memory.dmp
            Filesize

            176KB