Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
a4d1aef9ba64ad4300c744297795bc42.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4d1aef9ba64ad4300c744297795bc42.dll
Resource
win10v2004-20240221-en
General
-
Target
a4d1aef9ba64ad4300c744297795bc42.dll
-
Size
1.0MB
-
MD5
a4d1aef9ba64ad4300c744297795bc42
-
SHA1
be899148b1549b1cec6e2eb9db0f94e700fc0334
-
SHA256
74cf2e1f4dce793dc8bc01b3d1691e102c08bb15a3c65bb5c06a48baba0e1fb5
-
SHA512
07eb2837ea2b9ecbcdcebc764ee33741d6794d41b816bd7f7a95e819675d663d721a27bbf22591b53415626969dee97c616c475c20fc50d60fbc64cd1802701d
-
SSDEEP
12288:9fHnu1hxBOwTdG7MDsDbQg779SweGIvdZOyjGU+G0VCspXMl3A6Gnzq9PBa8nT2:pHK3OwTd8MQDbQgHgUIv1jGUXuCs9qW
Malware Config
Extracted
bazarloader
104.248.170.50
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2144-0-0x0000000001DF0000-0x0000000001E17000-memory.dmp BazarLoaderVar6 behavioral1/memory/1136-1-0x0000000000380000-0x00000000003A7000-memory.dmp BazarLoaderVar6 behavioral1/memory/1136-4-0x0000000000380000-0x00000000003A7000-memory.dmp BazarLoaderVar6 behavioral1/memory/2144-64-0x0000000001DF0000-0x0000000001E17000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a4d1aef9ba64ad4300c744297795bc42.dll1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\a4d1aef9ba64ad4300c744297795bc42.dll,DllRegisterServer {1266BA58-7121-4C27-9636-D100CC705EBE}1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b939798c07be8504359ffbe67b932bbf
SHA1d19213e2483d9337e61191b97ab03f45418375e9
SHA2568a9914d4d0ec649870fb20ce0c5920f795972b09791f61f68a0342af6eed97d4
SHA512c543691036f8a762741a4997e8e1e7a6533ce28aa843622e0c9291c300a0af730849dfebaa9fd1968eab8587cb29ce78bf8cd16703d73ca2b5e2b33f4d4c6a32
-
C:\Users\Admin\AppData\Local\Temp\CabA8B1.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarAB14.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
memory/1136-1-0x0000000000380000-0x00000000003A7000-memory.dmpFilesize
156KB
-
memory/1136-4-0x0000000000380000-0x00000000003A7000-memory.dmpFilesize
156KB
-
memory/2144-0-0x0000000001DF0000-0x0000000001E17000-memory.dmpFilesize
156KB
-
memory/2144-64-0x0000000001DF0000-0x0000000001E17000-memory.dmpFilesize
156KB