Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 15:49
Static task
static1
Behavioral task
behavioral1
Sample
3a5843a2520140837a943be5f430e6ba.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a5843a2520140837a943be5f430e6ba.dll
Resource
win10v2004-20231215-en
General
-
Target
3a5843a2520140837a943be5f430e6ba.dll
-
Size
288KB
-
MD5
3a5843a2520140837a943be5f430e6ba
-
SHA1
c4f57b687b5d39ed5c58fe4876967b617e0f523f
-
SHA256
b731d646e47f25e2f0feac5f036427c6723b2a2a4d13163e58d73acc94251663
-
SHA512
0324f23f01fa1d4e15406113aedfa950ee0f7d31b609bd1f997ed8cf0722702a4918b36a2dd1aa7dd6fb61879ca9eb54ac740fdf77024201cdc6c58c7df7261d
-
SSDEEP
3072:p6QlU5T0+vk+wYDgN3XwmbvV4Ynnbe9rhNifQMpnIjZ9jAPUn4CbwKL0Fo3dgqTu:pXEwZSZeKZVA6BNL0F1h31eMgIfz
Malware Config
Extracted
bazarloader
128.199.54.51
161.35.152.204
161.35.95.166
whitestorm9p.bazar
yellowdownpour81.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2344-0-0x0000000001E90000-0x0000000001F6C000-memory.dmp BazarLoaderVar6 behavioral1/memory/2904-1-0x0000000001E00000-0x0000000001EDC000-memory.dmp BazarLoaderVar6 behavioral1/memory/2904-2-0x0000000001E00000-0x0000000001EDC000-memory.dmp BazarLoaderVar6 behavioral1/memory/2344-3-0x0000000001E90000-0x0000000001F6C000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3a5843a2520140837a943be5f430e6ba.dll1⤵PID:2344
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3a5843a2520140837a943be5f430e6ba.dll,StartW {86B6AF19-3872-4F2C-AC34-4B61CC5C7E4D}1⤵PID:2904