Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 13:44

General

  • Target

    3883bba6d366e73e63226f1e842b44e5.dll

  • Size

    429KB

  • MD5

    3883bba6d366e73e63226f1e842b44e5

  • SHA1

    869e3dafe24ed7e764d489dd38048fee4ad91090

  • SHA256

    4e4c7f6c2c9c7b4d73b73b38132dc9972c7d1492d628fe5d4ffb9b105ac84799

  • SHA512

    f51f0bb734d389bbf3868ac5208cb582795977a961ad6b021dd11933090eafa1f47d0cb9e4b862859f4c2fd7772806bdf336aaebc95d49286f17b33db37c3423

  • SSDEEP

    12288:dCQXHfmzl5O43PLKOWVaLuox94QsbcG0CZgL:lOrO2PLKlVFox94QswTCeL

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 2 IoCs
  • Tries to connect to .bazar domain 1 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\3883bba6d366e73e63226f1e842b44e5.dll
    1⤵
      PID:2264

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      3144ed9c535c8bd45da7998a371cfca1

      SHA1

      08858fc917f748c4b5b98e6a3a05f1ac00f136ac

      SHA256

      02023c4c819a93adefbbd1aded5821f403ee607b60e4041b2b105bfa75b884f4

      SHA512

      305f347d211fd0bdd930a5b644996fc227a95f37fe8a6d22a3f332bb8afc43988e8c2dc399350789966e0b87ff5fd04331ababee07648d4dc6e43b5c19f11ede

    • C:\Users\Admin\AppData\Local\Temp\Cab4B26.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar4BB5.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • memory/2264-0-0x00000000002D0000-0x000000000030E000-memory.dmp
      Filesize

      248KB

    • memory/2264-1-0x00000000002D0000-0x000000000030E000-memory.dmp
      Filesize

      248KB