Malware Analysis Report

2024-10-23 17:37

Sample ID 231224-vk1kfafabj
Target 0734500b39c49a7d1540a078cf764ae6
SHA256 282c8bb556eb3e2bf22836785ff04ebd1edab6cc36714f3b5a95dca9b9136767
Tags
bazarloader dropper loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

282c8bb556eb3e2bf22836785ff04ebd1edab6cc36714f3b5a95dca9b9136767

Threat Level: Known bad

The file 0734500b39c49a7d1540a078cf764ae6 was found to be: Known bad.

Malicious Activity Summary

bazarloader dropper loader

Bazar Loader

Bazar/Team9 Loader payload

Tries to connect to .bazar domain

Unexpected DNS network traffic destination

Looks up external IP address via web service

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-24 17:03

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-24 17:03

Reported

2023-12-24 19:32

Platform

win7-20231215-en

Max time kernel

141s

Max time network

154s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\0734500b39c49a7d1540a078cf764ae6.dll

Signatures

Bazar Loader

loader dropper bazarloader

Bazar/Team9 Loader payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\0734500b39c49a7d1540a078cf764ae6.dll

Network

Country Destination Domain Proto
US 52.8.202.218:443 tcp
US 52.8.202.218:443 tcp
US 54.185.61.176:443 tcp
US 54.185.61.176:443 tcp
NL 45.148.120.206:443 tcp
NL 45.148.120.206:443 tcp
DE 45.153.240.189:443 tcp
DE 45.153.240.189:443 tcp

Files

memory/2532-0-0x0000000027280000-0x00000000272BE000-memory.dmp

memory/2532-1-0x000007FEF6F60000-0x000007FEF70E1000-memory.dmp

memory/2532-3-0x0000000027280000-0x00000000272BE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-24 17:03

Reported

2023-12-24 19:32

Platform

win10v2004-20231215-en

Max time kernel

143s

Max time network

152s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\0734500b39c49a7d1540a078cf764ae6.dll

Signatures

Bazar Loader

loader dropper bazarloader

Bazar/Team9 Loader payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Tries to connect to .bazar domain

Description Indicator Process Target
N/A yellowdownpour81.bazar N/A N/A
N/A yellowdownpour81.bazar N/A N/A
N/A greencloud46a.bazar N/A N/A
N/A whitestorm9p.bazar N/A N/A

Unexpected DNS network traffic destination

Description Indicator Process Target
Destination IP 194.36.144.87 N/A N/A
Destination IP 195.10.195.195 N/A N/A
Destination IP 195.10.195.195 N/A N/A
Destination IP 195.10.195.195 N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
HTTP URL https://api.opennicproject.org/geoip/?bare&ipv=4 N/A N/A

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\0734500b39c49a7d1540a078cf764ae6.dll

Network

Country Destination Domain Proto
GB 96.16.110.114:80 tcp
US 8.8.8.8:53 85.177.190.20.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 52.8.202.218:443 tcp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 54.185.61.176:443 tcp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
NL 45.148.120.206:443 tcp
DE 45.153.240.189:443 tcp
US 8.8.8.8:53 2.36.159.162.in-addr.arpa udp
US 8.8.8.8:53 api.opennicproject.org udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
DE 116.203.98.109:443 api.opennicproject.org tcp
US 8.8.8.8:53 109.98.203.116.in-addr.arpa udp
US 8.8.8.8:53 32.169.19.2.in-addr.arpa udp
DE 195.10.195.195:53 greencloud46a.bazar udp
US 8.8.8.8:53 201.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 195.195.10.195.in-addr.arpa udp
PA 186.73.40.224:443 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
DE 195.10.195.195:53 whitestorm9p.bazar udp
PA 186.73.40.224:443 tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
DE 195.10.195.195:53 yellowdownpour81.bazar udp
DE 194.36.144.87:53 yellowdownpour81.bazar udp
PA 186.73.40.224:443 tcp
US 8.8.8.8:53 87.144.36.194.in-addr.arpa udp
US 8.8.8.8:53 104.116.69.13.in-addr.arpa udp

Files

memory/3404-0-0x0000000027720000-0x000000002775E000-memory.dmp

memory/3404-1-0x00007FFADD9E0000-0x00007FFADDB61000-memory.dmp

memory/3404-3-0x0000000027720000-0x000000002775E000-memory.dmp