Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
98ed90d195c526a149a4df51da593f9a.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98ed90d195c526a149a4df51da593f9a.dll
Resource
win10v2004-20231222-en
General
-
Target
98ed90d195c526a149a4df51da593f9a.dll
-
Size
338KB
-
MD5
98ed90d195c526a149a4df51da593f9a
-
SHA1
0dc8a9522b390770f5d46d50703e677cd1326a06
-
SHA256
aecaf4d991c7932cdb64113ab26248a302171b91584ad20055217ce75ed41ae9
-
SHA512
3de7e734b32702e7fe004ab2b8b7a9fd4e60e799b04912228fab16ab3edf16e6d5f080c8760f0621644649073344e1085e340076c29f3c53caddb54e11faea41
-
SSDEEP
6144:uZwKn8bxurvfUCEs7I4V2PsqHMc/PZ6RguROla0CWecIdn9TCwC6d6:zTbxuLfUCR2kQMgZ6W4OIePA6
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2944-0-0x0000000001EE0000-0x00000000020DA000-memory.dmp BazarLoaderVar5 behavioral1/memory/2944-1-0x0000000001EE0000-0x00000000020DA000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 2 2944 rundll32.exe 3 2944 rundll32.exe 4 2944 rundll32.exe 5 2944 rundll32.exe 6 2944 rundll32.exe 9 2944 rundll32.exe 10 2944 rundll32.exe 13 2944 rundll32.exe 14 2944 rundll32.exe 15 2944 rundll32.exe -
Tries to connect to .bazar domain 1 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 14 greencloud46a.bazar -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 134.195.4.2