Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-01-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
8186ddfa67159cae9dc6bbe64b76eb2e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8186ddfa67159cae9dc6bbe64b76eb2e.dll
Resource
win10v2004-20231215-en
General
-
Target
8186ddfa67159cae9dc6bbe64b76eb2e.dll
-
Size
956KB
-
MD5
8186ddfa67159cae9dc6bbe64b76eb2e
-
SHA1
0a3f868cec4f16531adee05620ca9868e94e8538
-
SHA256
1bdb149fc19797341b0dd34325951eb0fd1451ff4245908db5a35cb134ad280f
-
SHA512
6d3da02460e471d4b459f99602f9efcd7ec7c0e6487d4837689c963ae0adc05b9b37e909f4251ce956d54cd6e25ea03be1e0c548fdd96a2422a55531fbe6517b
-
SSDEEP
12288:cgjcpLmq2lWk8gIFjJyslu0JULFwqrBEtyJIkGkL1QBNeUxLW40T2eM:HjSGl1IFFJ00SBwqV914NroT2d
Malware Config
Extracted
bazarloader
134.209.196.117
142.93.135.196
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-0-0x00000000004C0000-0x00000000004D4000-memory.dmp BazarLoaderVar6 behavioral1/memory/2372-1-0x00000000004C0000-0x00000000004D4000-memory.dmp BazarLoaderVar6 behavioral1/memory/2644-2-0x00000000001C0000-0x00000000001D4000-memory.dmp BazarLoaderVar6 behavioral1/memory/2644-3-0x00000000001C0000-0x00000000001D4000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8186ddfa67159cae9dc6bbe64b76eb2e.dll1⤵PID:2372
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\8186ddfa67159cae9dc6bbe64b76eb2e.dll,StartW {0E926056-932D-4A85-B03C-F1BB362D187C}1⤵PID:2644