Analysis
-
max time kernel
150s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:53
Static task
static1
Behavioral task
behavioral1
Sample
2c55e4a21797f201d9af90fb0e116d3d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c55e4a21797f201d9af90fb0e116d3d.dll
Resource
win10v2004-20231215-en
General
-
Target
2c55e4a21797f201d9af90fb0e116d3d.dll
-
Size
288KB
-
MD5
2c55e4a21797f201d9af90fb0e116d3d
-
SHA1
6342ee315e548955d5d29e60a37525d9b2339ae7
-
SHA256
431f43dfd6254fb710e3bf37b506b2e81313ba4cefdde251777ca5a04f54d269
-
SHA512
57dc739726ed2760e21c16d0f22923aa90c24c5f9979f4a2a1fc0f3d5324e9937f037589c16138ca30ec7525d90f458f871e79468382937f8897dd3065170755
-
SSDEEP
3072:p6QlU5T0+vk+wYDgN3XwmbvV4Ynnbe9rhNifQMpnIjZ9jAPUn4CbwKL0Fo3dgqTj:pXEwZSZeKZVA6BNL0F1h31eMgIfq
Malware Config
Extracted
bazarloader
128.199.54.51
161.35.152.204
161.35.95.166
whitestorm9p.bazar
yellowdownpour81.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1216-0-0x0000000002A00000-0x0000000002ADC000-memory.dmp BazarLoaderVar6 behavioral2/memory/1216-1-0x0000000002A00000-0x0000000002ADC000-memory.dmp BazarLoaderVar6 behavioral2/memory/8-2-0x000001CC643C0000-0x000001CC6449C000-memory.dmp BazarLoaderVar6 behavioral2/memory/8-3-0x000001CC643C0000-0x000001CC6449C000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2c55e4a21797f201d9af90fb0e116d3d.dll1⤵PID:1216
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\2c55e4a21797f201d9af90fb0e116d3d.dll,StartW {8561DE1B-0D80-4D4F-9159-EF3753026DAC}1⤵PID:8