Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
1.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Documents.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Documents.lnk
Resource
win10v2004-20240226-en
General
-
Target
Documents.lnk
-
Size
1KB
-
MD5
db8f42a798dd65d9bd8398c3e2564f06
-
SHA1
7df618ca8e5e21faf19ece8c2470f62af8e4ea15
-
SHA256
59b77f3b8d2e7d72c61d522a2bcabbe0b47be3b73e1a4001cb763589a656134c
-
SHA512
3533442932c0a796de82668f334f264b6aac4f3552eef535caeda4bb7d4feeb7d1789c09424ac3de506a8438ab9d19713ce0272816c5d8b4dd8ae545bc862053
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral4/memory/1196-0-0x0000000180000000-0x000000018002A000-memory.dmp BazarLoaderVar5 behavioral4/memory/1196-1-0x0000000180000000-0x000000018002A000-memory.dmp BazarLoaderVar5 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 4100 wrote to memory of 1196 4100 cmd.exe rundll32.exe PID 4100 wrote to memory of 1196 4100 cmd.exe rundll32.exe