Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 02:52
Static task
static1
Behavioral task
behavioral1
Sample
4e02ce310c2b7a1cebb58714781de17a.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e02ce310c2b7a1cebb58714781de17a.dll
Resource
win10v2004-20231215-en
General
-
Target
4e02ce310c2b7a1cebb58714781de17a.dll
-
Size
338KB
-
MD5
4e02ce310c2b7a1cebb58714781de17a
-
SHA1
48eb0eae7c68be446d6bdc9f44bd2ee2e286f2cf
-
SHA256
56772dca4331188918e3763a9e934e9c8e5994c06daf158f745419a4256dac91
-
SHA512
1e384b595802ac9a153a578ac617ef421aa6fd7cfd9bfc10f0ab4ddaffd2f2be7fac6bb377eebe3c60c6f97ca4b29617de2925520bde524c70ff03d896b3d99e
-
SSDEEP
6144:uZwKn8bxurvfUCEs7I4V2PsqHMc/PZ6RguROla0CWecIdn9TCwC6dU:zTbxuLfUCR2kQMgZ6W4OIePAU
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2864-0-0x0000000001E70000-0x000000000206A000-memory.dmp BazarLoaderVar5 behavioral1/memory/2864-1-0x0000000001E70000-0x000000000206A000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 2 2864 rundll32.exe 3 2864 rundll32.exe 4 2864 rundll32.exe 5 2864 rundll32.exe 6 2864 rundll32.exe 9 2864 rundll32.exe 10 2864 rundll32.exe 11 2864 rundll32.exe 12 2864 rundll32.exe 13 2864 rundll32.exe -
Tries to connect to .bazar domain 1 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 12 greencloud46a.bazar -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 134.195.4.2