Malware Analysis Report

2024-10-19 02:58

Sample ID 231226-eqgrhsdae7
Target 52f7a51c10ed1af473b8e49753b1a776
SHA256 2bc93ff34de7019410fb251d7dcfeb731795e8375402eca5a526dbe1ffbb6f04
Tags
bazarloader dropper loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2bc93ff34de7019410fb251d7dcfeb731795e8375402eca5a526dbe1ffbb6f04

Threat Level: Known bad

The file 52f7a51c10ed1af473b8e49753b1a776 was found to be: Known bad.

Malicious Activity Summary

bazarloader dropper loader

Bazar Loader

Bazar/Team9 Loader payload

Blocklisted process makes network request

Tries to connect to .bazar domain

Unexpected DNS network traffic destination

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-26 04:08

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-26 04:08

Reported

2024-01-02 21:19

Platform

win7-20231215-en

Max time kernel

132s

Max time network

143s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\52f7a51c10ed1af473b8e49753b1a776.dll,#1

Signatures

Bazar Loader

loader dropper bazarloader

Bazar/Team9 Loader payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\52f7a51c10ed1af473b8e49753b1a776.dll,#1

Network

Country Destination Domain Proto
US 18.237.101.6:443 tcp
US 18.237.101.6:443 tcp
US 34.214.86.190:443 tcp
US 34.214.86.190:443 tcp
RO 89.41.182.36:443 tcp
RO 89.41.182.36:443 tcp
NZ 185.99.133.101:443 tcp
NZ 185.99.133.101:443 tcp

Files

memory/2024-0-0x0000000001C30000-0x0000000001E2A000-memory.dmp

memory/2024-1-0x0000000001C30000-0x0000000001E2A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-26 04:08

Reported

2024-01-02 21:19

Platform

win10v2004-20231215-en

Max time kernel

143s

Max time network

154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\52f7a51c10ed1af473b8e49753b1a776.dll,#1

Signatures

Bazar Loader

loader dropper bazarloader

Bazar/Team9 Loader payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Tries to connect to .bazar domain

Description Indicator Process Target
N/A greencloud46a.bazar N/A N/A
N/A whitestorm9p.bazar N/A N/A
N/A yellowdownpour81.bazar N/A N/A

Unexpected DNS network traffic destination

Description Indicator Process Target
Destination IP 134.195.4.2 N/A N/A
Destination IP 134.195.4.2 N/A N/A
Destination IP 134.195.4.2 N/A N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\52f7a51c10ed1af473b8e49753b1a776.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 68.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 18.237.101.6:443 tcp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 34.214.86.190:443 tcp
US 8.8.8.8:53 167.109.18.2.in-addr.arpa udp
RO 89.41.182.36:443 tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 www.microsoft.com udp
PH 23.37.1.217:80 www.microsoft.com tcp
PH 23.37.1.217:80 www.microsoft.com tcp
US 8.8.8.8:53 217.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
NZ 185.99.133.101:443 tcp
US 134.195.4.2:53 greencloud46a.bazar udp
PA 186.73.40.224:443 tcp
US 8.8.8.8:53 2.4.195.134.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 134.195.4.2:53 whitestorm9p.bazar udp
PA 186.73.40.224:443 tcp
US 8.8.8.8:53 57.110.18.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 134.195.4.2:53 yellowdownpour81.bazar udp
PA 186.73.40.224:443 tcp
US 8.8.8.8:53 183.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 32.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 151.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

memory/3888-0-0x00000234A9DF0000-0x00000234A9FEA000-memory.dmp

memory/3888-1-0x00000234A9DF0000-0x00000234A9FEA000-memory.dmp