Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:25
Static task
static1
Behavioral task
behavioral1
Sample
264ee2148fd34018ee969a40fb148713.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
264ee2148fd34018ee969a40fb148713.dll
Resource
win10v2004-20231215-en
General
-
Target
264ee2148fd34018ee969a40fb148713.dll
-
Size
1.0MB
-
MD5
264ee2148fd34018ee969a40fb148713
-
SHA1
d61ea7427e45ebbe4d66c19811a3afe188ed1aa6
-
SHA256
2d1d9fe54857b61b2778926a9aca6b40ccccb9150fe5a024d7809786f07ca715
-
SHA512
4b5facfe88ca135b85018a0f369edff882e406daabd1f0388f60d3080ac4d7d5c6eaed06de52b9780589ec07da89b0f3264cd100d3b60bfe75f9af3e6718a754
-
SSDEEP
12288:9fHnu1hxBOwTdG7MDsDbQg779SweGIvdZOyjGU+G0VCspXMl3A6Gnzq9PBa8nTM:pHK3OwTd8MQDbQgHgUIv1jGUXuCs9qs
Malware Config
Extracted
bazarloader
104.248.170.50
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2428-0-0x00000000005C0000-0x00000000005E7000-memory.dmp BazarLoaderVar6 behavioral1/memory/2748-1-0x0000000000190000-0x00000000001B7000-memory.dmp BazarLoaderVar6 behavioral1/memory/2748-2-0x0000000000190000-0x00000000001B7000-memory.dmp BazarLoaderVar6 behavioral1/memory/2428-3-0x00000000005C0000-0x00000000005E7000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\264ee2148fd34018ee969a40fb148713.dll1⤵PID:2428
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\264ee2148fd34018ee969a40fb148713.dll,DllRegisterServer {4F06E868-286F-4461-A989-61CAB0704094}1⤵PID:2748