Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 12:47
Static task
static1
Behavioral task
behavioral1
Sample
file2.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
file2.dll
Resource
win10v2004-20230621-en
General
-
Target
file2.dll
-
Size
1.3MB
-
MD5
7a8ff582c7e91af4c10019b82ada67b4
-
SHA1
e2f42f1520058593d93e5378760724f918705b04
-
SHA256
b35e23599a0c1f88bc04a1a656aa158fda2fc46750d810bfe6801f96cdbec0fa
-
SHA512
1087afe7168c66e10858e88004d213fa7286cae22b538324045595e637739938ef47273ccc8efda83e84f115d2800b121b18d3ca9241b9f04b386d887b301018
-
SSDEEP
12288:k63GNTFtSCQ8NLaVhGqEdxtsvoxR6polnJeGek1XAmb/VVyor5M1ITUHAS/JaNq8:dRQZrx1iKn27A0TqD4+
Malware Config
Extracted
bazarloader
162.33.179.217
45.61.136.110
192.155.90.240
162.33.179.111
reddew28c.bazar
bluehail.bazar
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.execmd.exedescription pid process target process PID 4380 wrote to memory of 3556 4380 rundll32.exe cmd.exe PID 4380 wrote to memory of 3556 4380 rundll32.exe cmd.exe PID 3556 wrote to memory of 5068 3556 cmd.exe PING.EXE PID 3556 wrote to memory of 5068 3556 cmd.exe PING.EXE PID 3556 wrote to memory of 2480 3556 cmd.exe rundll32.exe PID 3556 wrote to memory of 2480 3556 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\file2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 -n 8 > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\file2.dll", #1 ZF3bI6aD VI0rr2aG & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 83⤵
- Runs ping.exe
PID:5068
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\file2.dll", #1 ZF3bI6aD VI0rr2aG3⤵PID:2480
-
-