Analysis

  • max time kernel
    128s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 23:01

General

  • Target

    a4d1aef9ba64ad4300c744297795bc42.dll

  • Size

    1.0MB

  • MD5

    a4d1aef9ba64ad4300c744297795bc42

  • SHA1

    be899148b1549b1cec6e2eb9db0f94e700fc0334

  • SHA256

    74cf2e1f4dce793dc8bc01b3d1691e102c08bb15a3c65bb5c06a48baba0e1fb5

  • SHA512

    07eb2837ea2b9ecbcdcebc764ee33741d6794d41b816bd7f7a95e819675d663d721a27bbf22591b53415626969dee97c616c475c20fc50d60fbc64cd1802701d

  • SSDEEP

    12288:9fHnu1hxBOwTdG7MDsDbQg779SweGIvdZOyjGU+G0VCspXMl3A6Gnzq9PBa8nT2:pHK3OwTd8MQDbQgHgUIv1jGUXuCs9qW

Malware Config

Extracted

Family

bazarloader

C2

104.248.170.50

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a4d1aef9ba64ad4300c744297795bc42.dll
    1⤵
      PID:2144
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\a4d1aef9ba64ad4300c744297795bc42.dll,DllRegisterServer {1266BA58-7121-4C27-9636-D100CC705EBE}
      1⤵
        PID:1136

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        b939798c07be8504359ffbe67b932bbf

        SHA1

        d19213e2483d9337e61191b97ab03f45418375e9

        SHA256

        8a9914d4d0ec649870fb20ce0c5920f795972b09791f61f68a0342af6eed97d4

        SHA512

        c543691036f8a762741a4997e8e1e7a6533ce28aa843622e0c9291c300a0af730849dfebaa9fd1968eab8587cb29ce78bf8cd16703d73ca2b5e2b33f4d4c6a32

      • C:\Users\Admin\AppData\Local\Temp\CabA8B1.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\TarAB14.tmp
        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • memory/1136-1-0x0000000000380000-0x00000000003A7000-memory.dmp
        Filesize

        156KB

      • memory/1136-4-0x0000000000380000-0x00000000003A7000-memory.dmp
        Filesize

        156KB

      • memory/2144-0-0x0000000001DF0000-0x0000000001E17000-memory.dmp
        Filesize

        156KB

      • memory/2144-64-0x0000000001DF0000-0x0000000001E17000-memory.dmp
        Filesize

        156KB