Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 08:09
Static task
static1
Behavioral task
behavioral1
Sample
2e8d6b0a7210528da2b802c3b18cfe02.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e8d6b0a7210528da2b802c3b18cfe02.dll
Resource
win10v2004-20231215-en
General
-
Target
2e8d6b0a7210528da2b802c3b18cfe02.dll
-
Size
164KB
-
MD5
2e8d6b0a7210528da2b802c3b18cfe02
-
SHA1
8c6eb7ca9232d18254ec018ab833f6afa96c8f0e
-
SHA256
557fcd6807a4747e2ee662168744acc5c265d2034f14a5c57ab524e398e4f474
-
SHA512
a836b3392aa00e726f5b437478e71ddef9c87506fff488cce8128417d630de927e814a7d97e167f7435d3479b48a658f7a5be59f5365ac3ddc2381ac3c18e285
-
SSDEEP
3072:cTltpXTmRUD82PbjCb5lcUpLhUf05x97bsqWpaM0fB8U6xcBwVSuU1E7YbqnOuOR:CuC7jj05CUpLhUsj97hM28xmwUuUKkbV
Malware Config
Extracted
bazarloader
167.99.240.197
207.154.236.187
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2092-0-0x0000000002500000-0x00000000025F2000-memory.dmp BazarLoaderVar6 behavioral2/memory/4240-1-0x000001FDEAED0000-0x000001FDEAFC2000-memory.dmp BazarLoaderVar6 behavioral2/memory/4240-2-0x000001FDEAED0000-0x000001FDEAFC2000-memory.dmp BazarLoaderVar6 behavioral2/memory/2092-3-0x0000000002500000-0x00000000025F2000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2e8d6b0a7210528da2b802c3b18cfe02.dll1⤵PID:2092
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\2e8d6b0a7210528da2b802c3b18cfe02.dll,DllRegisterServer {98D451AB-ADF1-4286-850A-9C90637ABC66}1⤵PID:4240