Analysis
-
max time kernel
122s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
1.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Documents.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Documents.lnk
Resource
win10v2004-20240226-en
General
-
Target
1.dll
-
Size
363KB
-
MD5
7162fdf107c2d36f99c59d5435a4d399
-
SHA1
b4ffeac7e7b25409b709377430dfe8821ca21e6e
-
SHA256
1f9f8cf325ff2de752478ff0623086019ebd1ffbce1d1c2f60e0b70149279f10
-
SHA512
4098f01ba4da3742e96a70cf2478c26d8a24db1c97b048d27c40cb4f28c221c180ae356536b5bda41d9d041aa029dc951a90cd7fa038a5a7bc4c4d27a7fa95f8
-
SSDEEP
6144:RM8CPvvwq0YslcteDNCfgQ/Fkp8HuubxwHdy/6E6OuUNkTf:kvvwTYslTMIQQubxTNkD
Malware Config
Extracted
bazarloader
167.172.108.158
64.227.66.10
134.209.91.22
167.172.108.213
blackrain15.bazar
reddew28c.bazar
bluehail.bazar
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1524 2184 rundll32.exe 30 PID 2184 wrote to memory of 1524 2184 rundll32.exe 30 PID 2184 wrote to memory of 1524 2184 rundll32.exe 30 PID 1524 wrote to memory of 864 1524 cmd.exe 32 PID 1524 wrote to memory of 864 1524 cmd.exe 32 PID 1524 wrote to memory of 864 1524 cmd.exe 32 PID 1524 wrote to memory of 2664 1524 cmd.exe 33 PID 1524 wrote to memory of 2664 1524 cmd.exe 33 PID 1524 wrote to memory of 2664 1524 cmd.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\cmd.execmd /c choice /n /c y /d y /t 5 & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\1.dll", #1 wdtbkqfe koorgsfd & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\choice.exechoice /n /c y /d y /t 53⤵PID:864
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\1.dll", #1 wdtbkqfe koorgsfd3⤵PID:2664
-
-