Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 15:49

General

  • Target

    3a5843a2520140837a943be5f430e6ba.dll

  • Size

    288KB

  • MD5

    3a5843a2520140837a943be5f430e6ba

  • SHA1

    c4f57b687b5d39ed5c58fe4876967b617e0f523f

  • SHA256

    b731d646e47f25e2f0feac5f036427c6723b2a2a4d13163e58d73acc94251663

  • SHA512

    0324f23f01fa1d4e15406113aedfa950ee0f7d31b609bd1f997ed8cf0722702a4918b36a2dd1aa7dd6fb61879ca9eb54ac740fdf77024201cdc6c58c7df7261d

  • SSDEEP

    3072:p6QlU5T0+vk+wYDgN3XwmbvV4Ynnbe9rhNifQMpnIjZ9jAPUn4CbwKL0Fo3dgqTu:pXEwZSZeKZVA6BNL0F1h31eMgIfz

Malware Config

Extracted

Family

bazarloader

C2

128.199.54.51

161.35.152.204

161.35.95.166

whitestorm9p.bazar

yellowdownpour81.bazar

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\3a5843a2520140837a943be5f430e6ba.dll
    1⤵
      PID:2344
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3a5843a2520140837a943be5f430e6ba.dll,StartW {86B6AF19-3872-4F2C-AC34-4B61CC5C7E4D}
      1⤵
        PID:2904

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2344-0-0x0000000001E90000-0x0000000001F6C000-memory.dmp

        Filesize

        880KB

      • memory/2344-3-0x0000000001E90000-0x0000000001F6C000-memory.dmp

        Filesize

        880KB

      • memory/2904-1-0x0000000001E00000-0x0000000001EDC000-memory.dmp

        Filesize

        880KB

      • memory/2904-2-0x0000000001E00000-0x0000000001EDC000-memory.dmp

        Filesize

        880KB