Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
52d3254224b69b3ce75f3115619eb0d7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52d3254224b69b3ce75f3115619eb0d7.dll
Resource
win10v2004-20231222-en
General
-
Target
52d3254224b69b3ce75f3115619eb0d7.dll
-
Size
431KB
-
MD5
52d3254224b69b3ce75f3115619eb0d7
-
SHA1
2cebca2f2eb7e24b8b5ad1a75acfbdc9fc6dadca
-
SHA256
60e3f1aa7f85ea1f92ad1415eb2fd129b790d84954a6537761be3e63338f2de7
-
SHA512
00b1b154db74ad942badcb64ba639adb9e5ca85896e8a31630146ba43aa076ef08dc36f245733bb9fe7faaef7b19e86c075ad15e3a3ddf3b099768fd94dec03f
-
SSDEEP
6144:hh8rsk6YD+oR9XQPzllSJ23WQHcmMOjT/rCtWeOLI007rxqhy4ES5DGxa+7U0/t:hOtyPzzSQ3WEcXOHzt5INqntV+A
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1984-0-0x00000000025C0000-0x0000000002807000-memory.dmp BazarLoaderVar3 behavioral2/memory/1984-1-0x00000000025C0000-0x0000000002807000-memory.dmp BazarLoaderVar3 behavioral2/memory/1984-2-0x00000000025C0000-0x0000000002807000-memory.dmp BazarLoaderVar3 behavioral2/memory/1420-3-0x00000000022C0000-0x0000000002507000-memory.dmp BazarLoaderVar3 behavioral2/memory/1420-4-0x00000000022C0000-0x0000000002507000-memory.dmp BazarLoaderVar3 -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.execmd.exedescription pid process target process PID 1984 wrote to memory of 2316 1984 regsvr32.exe cmd.exe PID 1984 wrote to memory of 2316 1984 regsvr32.exe cmd.exe PID 2316 wrote to memory of 2960 2316 cmd.exe PING.EXE PID 2316 wrote to memory of 2960 2316 cmd.exe PING.EXE PID 2316 wrote to memory of 1420 2316 cmd.exe regsvr32.exe PID 2316 wrote to memory of 1420 2316 cmd.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\52d3254224b69b3ce75f3115619eb0d7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 -n 8 & "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\52d3254224b69b3ce75f3115619eb0d7.dll" mscp ahis & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\52d3254224b69b3ce75f3115619eb0d7.dll" mscp ahis3⤵PID:1420
-
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 81⤵
- Runs ping.exe
PID:2960