Analysis Overview
SHA256
078968cfc9af97a102a362ad87cb30e8d3d33d28d0dd7c97fc31e85ff3950611
Threat Level: Known bad
The file data.dll was found to be: Known bad.
Malicious Activity Summary
Bazar Loader
Bazar/Team9 Loader payload
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2021-11-30 20:25
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-11-30 20:25
Reported
2021-11-30 20:27
Platform
win7-en-20211014
Max time kernel
126s
Max time network
138s
Command Line
Signatures
Bazar Loader
Bazar/Team9 Loader payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1116 wrote to memory of 1336 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\system32\regsvr32.exe |
| PID 1116 wrote to memory of 1336 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\system32\regsvr32.exe |
| PID 1116 wrote to memory of 1336 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\system32\regsvr32.exe |
| PID 1116 wrote to memory of 1336 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\system32\regsvr32.exe |
| PID 1116 wrote to memory of 1336 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\system32\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\data.dll
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\data.dll
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\data.dll,DllRegisterServer {B5FA5DB3-71B0-4D06-9F2C-9F686B1DD40D}
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | microsoft.com | udp |
| SG | 104.215.148.63:443 | microsoft.com | tcp |
| SG | 104.215.148.63:443 | microsoft.com | tcp |
| US | 162.33.179.216:443 | tcp | |
| US | 162.33.179.216:443 | tcp |
Files
memory/1116-55-0x000007FEFBB91000-0x000007FEFBB93000-memory.dmp
memory/1336-56-0x0000000000000000-mapping.dmp
memory/1336-58-0x00000002F77D1000-0x00000002F77EE000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-11-30 20:25
Reported
2021-11-30 20:27
Platform
win10-en-20211014
Max time kernel
121s
Max time network
126s
Command Line
Signatures
Bazar Loader
Bazar/Team9 Loader payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2704 wrote to memory of 2724 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\system32\regsvr32.exe |
| PID 2704 wrote to memory of 2724 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\system32\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\data.dll
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\data.dll
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\data.dll,DllRegisterServer {C56AC8DB-4742-4122-BBAC-CC43C05A9354}
Network
| Country | Destination | Domain | Proto |
| IE | 52.109.76.32:443 | tcp | |
| US | 8.8.8.8:53 | time.windows.com | udp |
| NL | 20.101.57.9:123 | time.windows.com | udp |
| US | 8.8.8.8:53 | microsoft.com | udp |
| SG | 104.215.148.63:443 | microsoft.com | tcp |
| US | 162.33.179.216:443 | tcp |
Files
memory/2724-115-0x0000000000000000-mapping.dmp
memory/2724-116-0x00000002F77D1000-0x00000002F77EE000-memory.dmp