Analysis
-
max time kernel
97s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
04-04-2022 03:24
Static task
static1
Behavioral task
behavioral1
Sample
fileman.dll
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
fileman.dll
Resource
win10v2004-20220331-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
fileman.dll
-
Size
213KB
-
MD5
6f3be0dfe6b5971b16464b7924772445
-
SHA1
8af5e975c00f5bdbd843f644a60adbb5f8da8a0d
-
SHA256
b51cb6fa584a073fe95bcf8749cf84363cb431f520a5d97cec92aae88329b7cb
-
SHA512
a1a8d49ec7610c37284a2e9f7409f1f93343c7d9c676985b9a3759388835880e7e376451e89294654cb4fc0f6c6386876896da50347c8bc4a98b80b1825cd5ef
Score
10/10
Malware Config
Extracted
Family
bazarloader
C2
148.163.42.213
5.255.102.10
188.127.235.177
23.160.193.221
reddew28c.bazar
bluehail.bazar
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.execmd.exedescription pid process target process PID 4660 wrote to memory of 4384 4660 rundll32.exe cmd.exe PID 4660 wrote to memory of 4384 4660 rundll32.exe cmd.exe PID 4384 wrote to memory of 4628 4384 cmd.exe choice.exe PID 4384 wrote to memory of 4628 4384 cmd.exe choice.exe PID 4384 wrote to memory of 2184 4384 cmd.exe rundll32.exe PID 4384 wrote to memory of 2184 4384 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fileman.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c choice /n /c y /d y /t 8 & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\fileman.dll", #1 ZF3bI6aD VI0rr2aG & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\choice.exechoice /n /c y /d y /t 83⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\fileman.dll", #1 ZF3bI6aD VI0rr2aG3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2184-127-0x0000000000000000-mapping.dmp
-
memory/2184-128-0x0000015C521E0000-0x0000015C52200000-memory.dmpFilesize
128KB
-
memory/4384-125-0x0000000000000000-mapping.dmp
-
memory/4628-126-0x0000000000000000-mapping.dmp
-
memory/4660-124-0x000001A9F99C0000-0x000001A9F99E0000-memory.dmpFilesize
128KB