Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2024 19:15

General

  • Target

    3766646d032ae30b154c3d91be1c6e1e.dll

  • Size

    288KB

  • MD5

    3766646d032ae30b154c3d91be1c6e1e

  • SHA1

    b85b7f996b9a4400254db8e42ef5f1e578a20896

  • SHA256

    4af7dd47164faa6fb7c4e979026fd4badf5330f68c1ee65df0d74532ff060cd7

  • SHA512

    244e2c789ae99db462ada5b258fb8e1e83a91cb7a77eb9df0124c4ef72fc98662dbd5ef24a0ee52dc4bec6020547b01676795bf07f35a77a193316ae2892c13f

  • SSDEEP

    3072:p6QlU5T0+vk+wYDgN3XwmbvV4Ynnbe9rhNifQMpnIjZ9jAPUn4CbwKL0Fo3dgqT1:pXEwZSZeKZVA6BNL0F1h31eMgIfY

Malware Config

Extracted

Family

bazarloader

C2

128.199.54.51

161.35.152.204

161.35.95.166

whitestorm9p.bazar

yellowdownpour81.bazar

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\3766646d032ae30b154c3d91be1c6e1e.dll
    1⤵
      PID:2184
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3766646d032ae30b154c3d91be1c6e1e.dll,StartW {CBCA452D-B43B-438D-8184-5A5410C46722}
      1⤵
        PID:2776

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2184-0-0x0000000001D80000-0x0000000001E5C000-memory.dmp

        Filesize

        880KB

      • memory/2184-3-0x0000000001D80000-0x0000000001E5C000-memory.dmp

        Filesize

        880KB

      • memory/2776-1-0x0000000001B80000-0x0000000001C5C000-memory.dmp

        Filesize

        880KB

      • memory/2776-2-0x0000000001B80000-0x0000000001C5C000-memory.dmp

        Filesize

        880KB