Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 12:55
Static task
static1
Behavioral task
behavioral1
Sample
2a2dd2c7969c12c1202e16e0a9e33a2e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a2dd2c7969c12c1202e16e0a9e33a2e.dll
Resource
win10v2004-20231215-en
General
-
Target
2a2dd2c7969c12c1202e16e0a9e33a2e.dll
-
Size
752KB
-
MD5
2a2dd2c7969c12c1202e16e0a9e33a2e
-
SHA1
578de23c3b1ecc8c1a357da622d9a516a27e3dd3
-
SHA256
d14f75f7eb189289fddfc70e7096afd53640efa043f94427c8d08e633593c261
-
SHA512
0074e55ff2ef09a58a8506926f03e39d3522e8b8af6b9dc6143bce3ee435a8cf554e5d0049b705f36c043007076203ba3c9af159ccadb20b6264d89d52b12268
-
SSDEEP
12288:fT4Hx+QLMJYKYcBH6Z7t7GMVR7pM7L2rn65hYZJA0Q:6+QIma+7t7ZP7iQn652XA
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/540-0-0x000002C361710000-0x000002C36173A000-memory.dmp BazarLoaderVar5 behavioral2/memory/540-1-0x000002C361710000-0x000002C36173A000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exeflow pid process 40 540 rundll32.exe 41 540 rundll32.exe 45 540 rundll32.exe 52 540 rundll32.exe 53 540 rundll32.exe 54 540 rundll32.exe 56 540 rundll32.exe 57 540 rundll32.exe -
Tries to connect to .bazar domain 2 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 53 blackrain15.bazar 56 reddew28c.bazar -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 134.195.4.2 Destination IP 134.195.4.2