Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
7b7c0689f5111a83f4604abca7ed0cec.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b7c0689f5111a83f4604abca7ed0cec.dll
Resource
win10v2004-20231215-en
General
-
Target
7b7c0689f5111a83f4604abca7ed0cec.dll
-
Size
1.0MB
-
MD5
7b7c0689f5111a83f4604abca7ed0cec
-
SHA1
93fa8a16bc52643a005ba2ec9460856453112312
-
SHA256
a841abf9e4fe42d8b9d7fce102a20c99c26f3e1ef7cb888772b1ebd45ab419b6
-
SHA512
c39ae7e6437ec5046e95ee6a93c41ccc865a5ea94b21317ddd92b38ef0dd32f38bf559a870f411b4f1288794093ca00db4cdf1c906699fb050f1ce5e8f1143d4
-
SSDEEP
12288:9fHnu1hxBOwTdG7MDsDbQg779SweGIvdZOyjGU+G0VCspXMl3A6Gnzq9PBa8nT6:pHK3OwTd8MQDbQgHgUIv1jGUXuCs9qa
Malware Config
Extracted
bazarloader
104.248.170.50
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-0-0x00000000003B0000-0x00000000003D7000-memory.dmp BazarLoaderVar6 behavioral1/memory/2708-48-0x00000000002A0000-0x00000000002C7000-memory.dmp BazarLoaderVar6 behavioral1/memory/2708-73-0x00000000002A0000-0x00000000002C7000-memory.dmp BazarLoaderVar6 behavioral1/memory/2468-74-0x00000000003B0000-0x00000000003D7000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7b7c0689f5111a83f4604abca7ed0cec.dll1⤵PID:2468
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b7c0689f5111a83f4604abca7ed0cec.dll,DllRegisterServer {A1580C52-9CA3-4E1B-AE71-69CD54EB2F7E}1⤵PID:2708
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD539879aa85e200a7f1d905310eb77baa3
SHA1f47552caac5fb17f6a30a7e6a9a0dd686bc2a099
SHA256d9a74c9f6f6b8471b547385c2d374a754fb24d90ea6274ccc8cdd23362d3e4ea
SHA5125c8e954e19e3c418e682f98edd22d5031d68761540afd2993a385ece90de3ac4ba7fef8378ae1376d1260daf86b0dc88f05cd91c691f4371d1e0ba95fcb96c46
-
C:\Users\Admin\AppData\Local\Temp\Cab5016.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar522C.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
memory/2468-0-0x00000000003B0000-0x00000000003D7000-memory.dmpFilesize
156KB
-
memory/2468-74-0x00000000003B0000-0x00000000003D7000-memory.dmpFilesize
156KB
-
memory/2708-48-0x00000000002A0000-0x00000000002C7000-memory.dmpFilesize
156KB
-
memory/2708-73-0x00000000002A0000-0x00000000002C7000-memory.dmpFilesize
156KB