Analysis
-
max time kernel
131s -
max time network
180s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
15-10-2021 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1.dll
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1.dll
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
Documents.lnk
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral4
Sample
Documents.lnk
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
1.dll
-
Size
539KB
-
MD5
0fd8135a2957037c52811df5f68ddf22
-
SHA1
448630a1dea594d373c03b9ff6b48b70e68442b5
-
SHA256
04addd98627d2e486b64aa9e61598d85c4501c2865313144cc7e1c668bd34ef8
-
SHA512
1069bc169bdceeea1e4c63b622c9408b116dbabb990f29b2fa29352e3dca3b94520e43b21a0ba641720ffce919a4063560f68884730e6f6a2587996a1c49b3b9
Score
10/10
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1120-54-0x00000000002C0000-0x00000000002EA000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 4 1120 rundll32.exe 5 1120 rundll32.exe 6 1120 rundll32.exe 7 1120 rundll32.exe 8 1120 rundll32.exe