Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
a596169960aeede1bab8ee6fea3cac49.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a596169960aeede1bab8ee6fea3cac49.dll
Resource
win10v2004-20240221-en
General
-
Target
a596169960aeede1bab8ee6fea3cac49.dll
-
Size
288KB
-
MD5
a596169960aeede1bab8ee6fea3cac49
-
SHA1
94411a43f529e7918583fe38b3c01a98677b5ab8
-
SHA256
390145df647bf727bd629c4c4c77a211c0776f6b03eec501c35c377ed520165c
-
SHA512
e5e943f0e696f92443c05d5f67420e2502d203a87ee5cf3b9204377657d82d3cd1eef02ce532436ecb6b2fcbfad6ada79ed788b472d401566cb7355dbd3781ba
-
SSDEEP
3072:p6QlU5T0+vk+wYDgN3XwmbvV4Ynnbe9rhNifQMpnIjZ9jAPUn4CbwKL0Fo3dgqTx:pXEwZSZeKZVA6BNL0F1h31eMgIf0
Malware Config
Extracted
bazarloader
128.199.54.51
161.35.152.204
161.35.95.166
whitestorm9p.bazar
yellowdownpour81.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2300-0-0x0000000001F60000-0x000000000203C000-memory.dmp BazarLoaderVar6 behavioral1/memory/2480-1-0x0000000001B70000-0x0000000001C4C000-memory.dmp BazarLoaderVar6 behavioral1/memory/2480-2-0x0000000001B70000-0x0000000001C4C000-memory.dmp BazarLoaderVar6 behavioral1/memory/2300-3-0x0000000001F60000-0x000000000203C000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a596169960aeede1bab8ee6fea3cac49.dll1⤵PID:2300
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\a596169960aeede1bab8ee6fea3cac49.dll,StartW {C73C4450-DD1C-4405-B573-669FA1E82FE5}1⤵PID:2480