Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b.dll
Resource
win10v2004-20240226-en
General
-
Target
cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b.dll
-
Size
243KB
-
MD5
826ee7fb2a01664b3de92d65e2329d3d
-
SHA1
82f146d6542a0b2741c5b750bc6ed1675358c7fe
-
SHA256
cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b
-
SHA512
1773e703be227df86e60cdd0586f924a41861a14be17ff285bf5bb8a17fa0de4c61d752b9b1d229a3e9023fcfa9d39756c817e9d7e2f1b4d3491a4636d2566ae
-
SSDEEP
6144:46biUu1hG08YR8dt5/XOqHYNJJ1uK4vzYp2:46bM/R8V7HYTJMK480
Malware Config
Extracted
bazarloader
reddew28c.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/336-0-0x0000000002780000-0x00000000027AA000-memory.dmp BazarLoaderVar6 behavioral2/memory/4608-1-0x000001BE8CE90000-0x000001BE8CEBA000-memory.dmp BazarLoaderVar6 behavioral2/memory/4608-2-0x000001BE8CE90000-0x000001BE8CEBA000-memory.dmp BazarLoaderVar6 behavioral2/memory/336-3-0x0000000002780000-0x00000000027AA000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b.dll1⤵PID:336
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\cbd830c745bbec26733214798fe144c61ef4bac342c853f8a08b682077b2178b.dll,DllRegisterServer {5ED4E003-0045-45C0-90D5-99594AF5FB4F}1⤵PID:4608