Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
b88a03c6ff58bbe98c2b46037c2e3b20.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b88a03c6ff58bbe98c2b46037c2e3b20.dll
Resource
win10v2004-20240226-en
General
-
Target
b88a03c6ff58bbe98c2b46037c2e3b20.dll
-
Size
1.0MB
-
MD5
b88a03c6ff58bbe98c2b46037c2e3b20
-
SHA1
5153e73f8228896acca71818be751fe65170e0fa
-
SHA256
6e4c843402434ae40c95e9bc07ded85b89a637606c522831fa80bf01b94aec70
-
SHA512
4d2eb026020baec0c399ad54b5b4e1a11d1283c36048c5011bbc34d18f08bd36a4623cae5a78a215e033c3b31323c959b6152fc9d2024df97cee22e8591f530b
-
SSDEEP
12288:9fHnu1hxBOwTdG7MDsDbQg779SweGIvdZOyjGU+G0VCspXMl3A6Gnzq9PBa8nTo:pHK3OwTd8MQDbQgHgUIv1jGUXuCs9qI
Malware Config
Extracted
bazarloader
104.248.170.50
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4196-0-0x0000000000960000-0x0000000000987000-memory.dmp BazarLoaderVar6 behavioral2/memory/1708-1-0x0000021287970000-0x0000021287997000-memory.dmp BazarLoaderVar6 behavioral2/memory/1708-2-0x0000021287970000-0x0000021287997000-memory.dmp BazarLoaderVar6 behavioral2/memory/4196-3-0x0000000000960000-0x0000000000987000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b88a03c6ff58bbe98c2b46037c2e3b20.dll1⤵PID:4196
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\b88a03c6ff58bbe98c2b46037c2e3b20.dll,DllRegisterServer {60636FCE-7E1C-43D6-9303-399B42E439A5}1⤵PID:1708