Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/11/2021, 12:31

211101-pp5r3ahha4 10

31/10/2021, 09:03

211031-k1bwxacfaq 10

14/10/2021, 01:44

211014-b6aflafeg4 10

Analysis

  • max time kernel
    3889s
  • max time network
    3906s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    31/10/2021, 09:03

General

  • Target

    db5276c0d5ecd3b338a98983001a5b8cbbf5b488bf420d8cc0267801b963f479.dll

  • Size

    172KB

  • MD5

    6feafb5aa21e924e2a7dfc0cb87653e6

  • SHA1

    eae7d011f43747b9a67b115733dc906dcbf976e7

  • SHA256

    db5276c0d5ecd3b338a98983001a5b8cbbf5b488bf420d8cc0267801b963f479

  • SHA512

    b21704bc4b06eed4d3468d144f90132af87af031dd9f6ad3ac771f75d9b02227eecbac79a53079955bbd9ea3a050d14a52af5829a50eaec745b7c617c16bc1a1

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • BazarBackdoor

    Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.

  • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

  • Bazar/Team9 Backdoor payload 3 IoCs
  • Bazar/Team9 Loader payload 3 IoCs
  • Tries to connect to .bazar domain 64 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\db5276c0d5ecd3b338a98983001a5b8cbbf5b488bf420d8cc0267801b963f479.dll
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup
      2⤵
        PID:1500
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\db5276c0d5ecd3b338a98983001a5b8cbbf5b488bf420d8cc0267801b963f479.dll,DllRegisterServer {42B79409-7246-4C7C-9396-46C2A7E210D1}
      1⤵
        PID:4384
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\db5276c0d5ecd3b338a98983001a5b8cbbf5b488bf420d8cc0267801b963f479.dll,DllRegisterServer {42B79409-7246-4C7C-9396-46C2A7E210D1}
        1⤵
          PID:2692

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1500-120-0x00007FF731BE0000-0x00007FF731C2C000-memory.dmp

          Filesize

          304KB

        • memory/1500-122-0x00007FF731BE0000-0x00007FF731C2C000-memory.dmp

          Filesize

          304KB

        • memory/1548-118-0x0000000001F00000-0x000000000202C000-memory.dmp

          Filesize

          1.2MB

        • memory/2692-125-0x0000017DF9720000-0x0000017DF984C000-memory.dmp

          Filesize

          1.2MB

        • memory/4384-119-0x000002C17BD90000-0x000002C17BEBC000-memory.dmp

          Filesize

          1.2MB