Analysis

  • max time kernel
    128s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 22:46

General

  • Target

    7b7c0689f5111a83f4604abca7ed0cec.dll

  • Size

    1.0MB

  • MD5

    7b7c0689f5111a83f4604abca7ed0cec

  • SHA1

    93fa8a16bc52643a005ba2ec9460856453112312

  • SHA256

    a841abf9e4fe42d8b9d7fce102a20c99c26f3e1ef7cb888772b1ebd45ab419b6

  • SHA512

    c39ae7e6437ec5046e95ee6a93c41ccc865a5ea94b21317ddd92b38ef0dd32f38bf559a870f411b4f1288794093ca00db4cdf1c906699fb050f1ce5e8f1143d4

  • SSDEEP

    12288:9fHnu1hxBOwTdG7MDsDbQg779SweGIvdZOyjGU+G0VCspXMl3A6Gnzq9PBa8nT6:pHK3OwTd8MQDbQgHgUIv1jGUXuCs9qa

Malware Config

Extracted

Family

bazarloader

C2

104.248.170.50

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7b7c0689f5111a83f4604abca7ed0cec.dll
    1⤵
      PID:2468
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b7c0689f5111a83f4604abca7ed0cec.dll,DllRegisterServer {A1580C52-9CA3-4E1B-AE71-69CD54EB2F7E}
      1⤵
        PID:2708

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        39879aa85e200a7f1d905310eb77baa3

        SHA1

        f47552caac5fb17f6a30a7e6a9a0dd686bc2a099

        SHA256

        d9a74c9f6f6b8471b547385c2d374a754fb24d90ea6274ccc8cdd23362d3e4ea

        SHA512

        5c8e954e19e3c418e682f98edd22d5031d68761540afd2993a385ece90de3ac4ba7fef8378ae1376d1260daf86b0dc88f05cd91c691f4371d1e0ba95fcb96c46

      • C:\Users\Admin\AppData\Local\Temp\Cab5016.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar522C.tmp
        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • memory/2468-0-0x00000000003B0000-0x00000000003D7000-memory.dmp
        Filesize

        156KB

      • memory/2468-74-0x00000000003B0000-0x00000000003D7000-memory.dmp
        Filesize

        156KB

      • memory/2708-48-0x00000000002A0000-0x00000000002C7000-memory.dmp
        Filesize

        156KB

      • memory/2708-73-0x00000000002A0000-0x00000000002C7000-memory.dmp
        Filesize

        156KB