Analysis
-
max time kernel
129s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
8186ddfa67159cae9dc6bbe64b76eb2e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8186ddfa67159cae9dc6bbe64b76eb2e.dll
Resource
win10v2004-20231215-en
General
-
Target
8186ddfa67159cae9dc6bbe64b76eb2e.dll
-
Size
956KB
-
MD5
8186ddfa67159cae9dc6bbe64b76eb2e
-
SHA1
0a3f868cec4f16531adee05620ca9868e94e8538
-
SHA256
1bdb149fc19797341b0dd34325951eb0fd1451ff4245908db5a35cb134ad280f
-
SHA512
6d3da02460e471d4b459f99602f9efcd7ec7c0e6487d4837689c963ae0adc05b9b37e909f4251ce956d54cd6e25ea03be1e0c548fdd96a2422a55531fbe6517b
-
SSDEEP
12288:cgjcpLmq2lWk8gIFjJyslu0JULFwqrBEtyJIkGkL1QBNeUxLW40T2eM:HjSGl1IFFJ00SBwqV914NroT2d
Malware Config
Extracted
bazarloader
134.209.196.117
142.93.135.196
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1436-0-0x0000000002230000-0x0000000002244000-memory.dmp BazarLoaderVar6 behavioral2/memory/4432-1-0x000001EBDA1C0000-0x000001EBDA1D4000-memory.dmp BazarLoaderVar6 behavioral2/memory/4432-2-0x000001EBDA1C0000-0x000001EBDA1D4000-memory.dmp BazarLoaderVar6 behavioral2/memory/1436-3-0x0000000002230000-0x0000000002244000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8186ddfa67159cae9dc6bbe64b76eb2e.dll1⤵PID:1436
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\8186ddfa67159cae9dc6bbe64b76eb2e.dll,StartW {04ABE5A1-A658-4A0A-ABCF-A088513CF833}1⤵PID:4432