Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 00:44

General

  • Target

    222293d1f75c78a408b0c223b867309d.dll

  • Size

    1.3MB

  • MD5

    222293d1f75c78a408b0c223b867309d

  • SHA1

    20a06412fb63f9a1ca0dc084ab3f12263ef6fd6c

  • SHA256

    5bcd5816fa33b6adeb21f784dd038f678f7bbca442512b904ff64f9e823ef491

  • SHA512

    e5d890a76682e5a6a63dcc123dda0c236abdae972451882f43bc3c181fd064973048ceb1850c834aa19a47e59a0462fbeaa7e56de60bb73b849ce9d3113013e5

  • SSDEEP

    24576:4e7sM59umIKT76muuVh+9GstS/v84tG8cfx:4e7sMdIKH6ru3+9Gstg84tG5x

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\222293d1f75c78a408b0c223b867309d.dll
    1⤵
      PID:3992
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\222293d1f75c78a408b0c223b867309d.dll,StartW 1056327809
      1⤵
        PID:4468

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3992-0-0x0000000002D90000-0x0000000002DB4000-memory.dmp
        Filesize

        144KB

      • memory/3992-1-0x0000000002D90000-0x0000000002DB4000-memory.dmp
        Filesize

        144KB

      • memory/4468-2-0x000002341D670000-0x000002341D694000-memory.dmp
        Filesize

        144KB

      • memory/4468-3-0x000002341D670000-0x000002341D694000-memory.dmp
        Filesize

        144KB