Analysis
-
max time kernel
570s -
max time network
579s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 22:14
Behavioral task
behavioral1
Sample
1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27_unpacked.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27_unpacked.dll
Resource
win10v2004-20220812-en
General
-
Target
1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27.dll
-
Size
451KB
-
MD5
03a65801edbd3c3a8773b8f055d896e6
-
SHA1
393585b8e46880d537d771cfeb0061ad53345c77
-
SHA256
1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27
-
SHA512
17012ab456d5f0f1f5e95fe5d837ad424ded05dd83c249cb871d640dfe9c90f5008cb68814ce31d82a5156b6453b4391c4e91d9186bb9737e344ee7000d17718
-
SSDEEP
6144:3xd0pFLXGPKoQjVyhTmTi7yW26ixVgBEjhuky5NPa2u8ol7LHwNobSkQ+o4uEg8X:hdg1WPwjVeCW2jRy3a2Wjwvcg8sY
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3372-132-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/3372-133-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/3372-135-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/1328-136-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/1328-137-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27.dll1⤵PID:3372
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\1944514e7e2dfe6295b69d967d74da2dd4ee9df351c26e74f6c89e72e6e8bf27.dll,DllRegisterServer {920804BA-D32A-4FE1-9712-2564649BC320}1⤵PID:1328