Malware Analysis Report

2024-10-23 17:37

Sample ID 231219-wc44bsgbfq
Target 6e2316bb2c6cb9c5e3c26398574e5548
SHA256 016a36baa939016b069f379a632769eca6e77639543283583b1d5b675065279f
Tags
bazarloader dropper loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

016a36baa939016b069f379a632769eca6e77639543283583b1d5b675065279f

Threat Level: Known bad

The file 6e2316bb2c6cb9c5e3c26398574e5548 was found to be: Known bad.

Malicious Activity Summary

bazarloader dropper loader

Bazar Loader

Bazar/Team9 Loader payload

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-19 17:47

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-19 17:47

Reported

2023-12-19 19:04

Platform

win7-20231215-en

Max time kernel

120s

Max time network

124s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6e2316bb2c6cb9c5e3c26398574e5548.dll

Signatures

Bazar Loader

loader dropper bazarloader

Bazar/Team9 Loader payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6e2316bb2c6cb9c5e3c26398574e5548.dll

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\system32\regsvr32.exe,DllRegisterServer {12196DC5-F59B-4754-91B3-B93CCB1A9CFD}

Network

Country Destination Domain Proto
US 8.8.8.8:53 microsoft.com udp
US 20.112.250.133:443 microsoft.com tcp
US 20.112.250.133:443 microsoft.com tcp
DE 142.93.99.249:443 tcp
DE 142.93.99.249:443 tcp
DE 142.93.99.249:443 tcp
DE 142.93.99.249:443 tcp

Files

memory/1692-0-0x00000000004A0000-0x00000000004C8000-memory.dmp

memory/1692-1-0x00000000004A0000-0x00000000004C8000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-19 17:47

Reported

2023-12-19 19:04

Platform

win10v2004-20231215-en

Max time kernel

140s

Max time network

149s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6e2316bb2c6cb9c5e3c26398574e5548.dll

Signatures

Bazar Loader

loader dropper bazarloader

Bazar/Team9 Loader payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6e2316bb2c6cb9c5e3c26398574e5548.dll

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\system32\regsvr32.exe,DllRegisterServer {9D37E2C4-0DEC-4469-BB18-31C08345AE2B}

Network

Country Destination Domain Proto
US 8.8.8.8:53 148.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 175.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 microsoft.com udp
US 20.112.250.133:443 microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 2.17.5.133:443 www.microsoft.com tcp
US 8.8.8.8:53 133.250.112.20.in-addr.arpa udp
US 8.8.8.8:53 133.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 57.110.18.2.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 192.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 198.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
DE 142.93.99.249:443 tcp

Files

memory/3076-0-0x00000000008D0000-0x00000000008F8000-memory.dmp

memory/3076-1-0x00000000008D0000-0x00000000008F8000-memory.dmp