Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
c457e8760ba768b3a9746831c366ac1a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c457e8760ba768b3a9746831c366ac1a.dll
Resource
win10v2004-20240226-en
General
-
Target
c457e8760ba768b3a9746831c366ac1a.dll
-
Size
1.2MB
-
MD5
c457e8760ba768b3a9746831c366ac1a
-
SHA1
94fec4b344f00e5f890c6c850743c80f98659a72
-
SHA256
85a19656e73c4a3343b476bc823437a58df84e25a631fb543eb7bf876a9aef31
-
SHA512
830bdd275b1d929e892ff4e474cde20550b88f82ac59354f40ecb007eebc04492a512044783559020016002bb81665d5162c638934af95d8ad9aa4566d885dbd
-
SSDEEP
24576:0Wpc+G43nwqthqmmldpXoQ5IyXdLrgvHmrM:8+n3Hthqm9qgkM
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1960-0-0x000001B120A40000-0x000001B120A7B000-memory.dmp BazarLoaderVar5 behavioral2/memory/1960-1-0x00007FF9E1D60000-0x00007FF9E1EE2000-memory.dmp BazarLoaderVar5 behavioral2/memory/1960-3-0x000001B120A40000-0x000001B120A7B000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 18 IoCs
Processes:
rundll32.exeflow pid process 41 1960 rundll32.exe 60 1960 rundll32.exe 82 1960 rundll32.exe 84 1960 rundll32.exe 86 1960 rundll32.exe 87 1960 rundll32.exe 92 1960 rundll32.exe 93 1960 rundll32.exe 95 1960 rundll32.exe 96 1960 rundll32.exe 99 1960 rundll32.exe 103 1960 rundll32.exe 104 1960 rundll32.exe 111 1960 rundll32.exe 112 1960 rundll32.exe 116 1960 rundll32.exe 117 1960 rundll32.exe 118 1960 rundll32.exe -
Tries to connect to .bazar domain 10 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 117 yellowdownpour81.bazar 87 greencloud46a.bazar 103 greencloud46a.bazar 111 whitestorm9p.bazar 116 yellowdownpour81.bazar 99 greencloud46a.bazar 92 greencloud46a.bazar 93 greencloud46a.bazar 95 greencloud46a.bazar 96 greencloud46a.bazar -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 217.160.188.24 Destination IP 198.50.135.212 Destination IP 91.217.137.37 Destination IP 172.98.193.62 Destination IP 94.16.114.254 Destination IP 194.36.144.87 Destination IP 194.36.144.87 Destination IP 195.10.195.195 Destination IP 195.10.195.195 Destination IP 195.10.195.195 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
description flow ioc HTTP URL 82 https://api.opennicproject.org/geoip/?bare&ipv=4