Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
52f7a51c10ed1af473b8e49753b1a776.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52f7a51c10ed1af473b8e49753b1a776.dll
Resource
win10v2004-20231215-en
General
-
Target
52f7a51c10ed1af473b8e49753b1a776.dll
-
Size
338KB
-
MD5
52f7a51c10ed1af473b8e49753b1a776
-
SHA1
3810802f7f9291f4c8a3a9c2b0adf2359b33cd92
-
SHA256
2bc93ff34de7019410fb251d7dcfeb731795e8375402eca5a526dbe1ffbb6f04
-
SHA512
63dda9738f7e178c70e5ab9974268c48453ba358be65e169594a77e36f82e5787914488c0c09967f43a39446ec5ec6fd4fe4ba1c4ec834c2c6d3f25c96bd268f
-
SSDEEP
6144:uZwKn8bxurvfUCEs7I4V2PsqHMc/PZ6RguROla0CWecIdn9TCwC6dT:zTbxuLfUCR2kQMgZ6W4OIePAT
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2188-0-0x00000000020F0000-0x00000000022EA000-memory.dmp BazarLoaderVar5 behavioral1/memory/2188-1-0x00000000020F0000-0x00000000022EA000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 11 IoCs
Processes:
rundll32.exeflow pid process 2 2188 rundll32.exe 3 2188 rundll32.exe 4 2188 rundll32.exe 5 2188 rundll32.exe 6 2188 rundll32.exe 9 2188 rundll32.exe 10 2188 rundll32.exe 11 2188 rundll32.exe 14 2188 rundll32.exe 15 2188 rundll32.exe 16 2188 rundll32.exe -
Tries to connect to .bazar domain 2 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 14 greencloud46a.bazar 15 greencloud46a.bazar -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 194.36.144.87 Destination IP 134.195.4.2