Analysis

  • max time kernel
    139s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2023 03:31

General

  • Target

    a11d1c066d6bd8e35bec3f985649e112.dll

  • Size

    153KB

  • MD5

    a11d1c066d6bd8e35bec3f985649e112

  • SHA1

    651622388600efdc8e6ee4a92df6981d3881e5e9

  • SHA256

    a701108be3d3802eba7c79c5c68afc0fee833595cdada8df5ac02ef9b97d2ad1

  • SHA512

    851921cd7d07f11f397ba9058b0b3a99d4df61635fe894e5049b76d9a9ea0eec49ec6123d6fc8e105aa35947c65cab33a148b255ce663911267591f70d86a32d

  • SSDEEP

    1536:nxdifoVqWb2t3SLXMUthlUbf6cLRcJyXBq77TS1Vyzaw30qA/cimkd8TfnDItLqz:TMoVtb+37UP6jbK8q7PvJTLli1tq

Malware Config

Extracted

Family

bazarloader

C2

195.123.233.106

198.244.169.192

45.142.158.120

greencloud46a.bazar

whitestorm9p.bazar

yellowdownpour81.bazar

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs
  • Blocklisted process makes network request 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a11d1c066d6bd8e35bec3f985649e112.dll,#1
    1⤵
    • Blocklisted process makes network request
    PID:2736
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\a11d1c066d6bd8e35bec3f985649e112.dll,#1 1065787860
    1⤵
      PID:2764

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2736-0-0x0000000000290000-0x000000000036C000-memory.dmp

      Filesize

      880KB

    • memory/2736-3-0x0000000000290000-0x000000000036C000-memory.dmp

      Filesize

      880KB

    • memory/2764-1-0x0000000001C00000-0x0000000001CDC000-memory.dmp

      Filesize

      880KB

    • memory/2764-2-0x0000000001C00000-0x0000000001CDC000-memory.dmp

      Filesize

      880KB