{"id":90343,"date":"2021-09-16T14:19:41","date_gmt":"2021-09-16T08:49:41","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=90343"},"modified":"2023-08-08T18:52:51","modified_gmt":"2023-08-08T13:22:51","slug":"what-you-need-to-know-about-the-bazarloader-malware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/what-you-need-to-know-about-the-bazarloader-malware\/","title":{"rendered":"What you need to know about the BazarLoader Malware?"},"content":{"rendered":"<p>At the start of February 2021, Bazarloader malware was in the news about its mechanism of delivering the initial attack vector. It tricks a victim into connecting with a fake call where a threat actor asks to download malicious excel attachments from the portal to infect them. \u00a0We recently observed that its delivery mechanism is shifting to an older technique &#8211; popularly known as \u201cWordProcessingML,\u201d and now it delivers malicious attachments directly via email.<\/p>\n<h2 style=\"font-size: 27px;\"><strong>What is WordProcessingML?<\/strong><\/h2>\n<p>WordProcessingML or Word 2003 XML Document is an XML-based format introduced in Microsoft Office 2003 as one of the formats that could be chosen in the &#8220;Save As&#8221; feature to save Word documents, though not the default format (e.g., DOC, a proprietary binary format). This is different from the &#8220;Microsoft Office Open XML File Format&#8221; introduced in Office 2007, which consists of a ZIP archive of various files, including XML. In contrast, WordProcessingML is a single uncompressed XML file. Later versions of MS Office are still capable of loading and saving WordProcessingML.<\/p>\n<p><strong>Infection Chain:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-90355 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/09\/image.png\" alt=\"\" width=\"653\" height=\"185\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/image.png 957w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/image-300x85.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/image-650x184.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/image-768x217.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/image-789x223.png 789w\" sizes=\"(max-width: 653px) 100vw, 653px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Attack Chain<\/em><\/p>\n<p>The infection starts with a malspam having a Microsoft Word document (the older Word 2003 XML document). While the executing of the XML document file, it will automatically open the word application and run present macros.<\/p>\n<p>In the below fig, we can see the syntax for documents and macros.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90356 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/09\/222.png\" alt=\"\" width=\"722\" height=\"329\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/222.png 1151w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/222-300x137.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/222-650x296.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/222-768x350.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/222-789x359.png 789w\" sizes=\"(max-width: 722px) 100vw, 722px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.1- Original XML File<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90357 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/09\/1-1.png\" alt=\"\" width=\"698\" height=\"241\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/1-1.png 1041w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/1-1-300x103.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/1-1-650x224.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/1-1-768x265.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/1-1-789x272.png 789w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.2- Document view to Victim<\/em><\/p>\n<p>In wordprocessingML file, attribute \u201c&lt;w:name&gt;\u201d in\u201d&lt; w:binData&gt;\u201d element contains \u201ceditdata.mso\u201d file that is base64 encoded ActiveMime object. ActiveMime is Zlib-compressed data starting at offset 0x32, which contains VBA macro and OLE object-related data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90358 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/09\/666.png\" alt=\"\" width=\"700\" height=\"544\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/666.png 815w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/666-300x233.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/666-502x390.png 502w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/666-768x596.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/666-789x613.png 789w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.3- Steps to get OLE file<\/em><\/p>\n<p>The above highlighted OLE file is used to drop the HTA file on the victim\u2019s machine on the \u201cc:\\ProgramData\\\u201d location with the help of the command line.<\/p>\n<p>Adversaries also use text data with obfuscated \u201cy2nb\u201d in the original doc file to bypass AV solutions. By removing \u201cy2nb,\u201d we get base64 encoded data which contains the final URL to download malicious DLL payload. The below image shows the actual process.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90359 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/09\/ddd.png\" alt=\"\" width=\"719\" height=\"405\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/ddd.png 807w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/ddd-300x169.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/ddd-650x366.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/ddd-768x432.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/ddd-789x444.png 789w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.4- URL to download DLL<\/em><\/p>\n<p>These processes are done at run time by VBA macros present in the OLE file and HTA file \u201ciCoreBr.hta\u201d dropped at location \u201cc:\\ProgramData\\.\u201d The dropped file can be seen in fig 5.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-90363 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/09\/paint-hta.png\" alt=\"\" width=\"693\" height=\"324\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/paint-hta.png 729w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/paint-hta-300x140.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/paint-hta-650x304.png 650w\" sizes=\"(max-width: 693px) 100vw, 693px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.5- HTA file to download DLL<\/em><\/p>\n<p>Downloaded DLL is written on victim\u2019s public folder with name\u201d<em>icoreBr.jpg<\/em>\u201d to confuse victim as shown in fig 6.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90364 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/09\/paint-jpg.png\" alt=\"\" width=\"651\" height=\"334\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/paint-jpg.png 756w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/paint-jpg-300x154.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/09\/paint-jpg-650x334.png 650w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.6- Downloaded DLL as jpg<\/em><\/p>\n<p>This BazarLoader related DLL is used to download other modules of malware families such as Trickbot, Ryuk Ransomware, and <a href=\"https:\/\/blogs.quickheal.com\/cobalt-strike-2021-analysis-of-malicious-powershell-attack-framework\/\">Cobalt strike<\/a> activity.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>As the Bazarloader campaign is still active and changing its spreading mechanism, users should be careful while opening emails, documents sent by unknown senders and keep the AV updated. <a href=\"https:\/\/www.quickheal.co.in\/\">Quick Heal<\/a> customers are protected from these types of attacks at multiple detection levels.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>IoCs:<\/strong><\/p>\n<ul>\n<li>WordProcessingML files: \u00a01b265cbdfb47ef2675bbc19d7542aec3<\/li>\n<li>DLL :\u00a0 \u00a0dba397022561b196d000d81907f543d0<\/li>\n<li>Domains: obeymanagement2016b.com, nephewboring2013b.com<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>At the start of February 2021, Bazarloader malware was in the news about its mechanism of delivering the initial attack vector. It tricks a victim into connecting with a fake call where a threat actor asks to download malicious excel attachments from the portal to infect them. \u00a0We recently observed that its delivery mechanism is [&hellip;]<\/p>\n","protected":false},"author":62,"featured_media":90413,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[303,910],"tags":[1862,1861,1863,534,49,50],"class_list":["post-90343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing","category-ransomware","tag-bazarloader","tag-phishingscam","tag-trickbot","tag-cybersecurity","tag-malware","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90343"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=90343"}],"version-history":[{"count":14,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90343\/revisions"}],"predecessor-version":[{"id":91439,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90343\/revisions\/91439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/90413"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=90343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=90343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=90343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}