Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe
-
Size
280KB
-
MD5
5e7080ef6f95218618250291824c02d7
-
SHA1
1d08b94efe4ad5fca6f60f7d1c4f6312365d0b4b
-
SHA256
39655f6b003a6f5ef02b4ed8878f79f623d4d38b7832fa18f6b2e4e2d2232222
-
SHA512
394c23f48bf09e07caa808f8457319148f848b8df16b7657340b8313b9bd858e7d2f53a2bb0c2712afce9b8a19f7e472c72cddfeaf1d7f725bbc127cf8775a5a
-
SSDEEP
6144:3Yc2uFGmzyW2ckd91ylUWCLH07TdDMmqxlGTyY2VBP478rhbm:3YcrFG7GljC707TBkx8Tv2/478I
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 1 IoCs
resource yara_rule behavioral2/memory/2912-2-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar6 -
Tries to connect to .bazar domain 27 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 90 yw¡fwyex.bazar 92 reœþekud.bazar 78 yz8wyyr.bazar 101 waá0ekex.bazar 82 yrñuygex.bazar 96 yre8wyyr.bazar 76 sydneynewtours.bazar 77 erxâygso.bazar 88 yz´gwyud.bazar 66 vacationinsydney2021.bazar 83 viÿâavso.bazar 89 yrùqekso.bazar 103 soùqekex.bazar 104 toœþwyso.bazar 80 ewzvygso.bazar 79 waùqwyyr.bazar 87 ekzvwyud.bazar 91 yr8ygex.bazar 95 yw‰©ygyr.bazar 97 erœþekud.bazar 81 ygá0wyud.bazar 84 wyá0avso.bazar 61 vacationinsydney2021.bazar 74 bestsightsofwildaustralia.bazar 94 ygùqekex.bazar 102 reá0wyud.bazar 71 vacationinsydney2021.bazar -
Unexpected DNS network traffic destination 27 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 195.10.195.195 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 94.247.43.254 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 Destination IP 65.21.1.106 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
description flow ioc HTTP URL 56 https://api.opennicproject.org/geoip/?bare&ipv=4&wl=all&res=8
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe"1⤵PID:2912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4060 /prefetch:81⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exeC:\Users\Admin\AppData\Local\Temp\2024-09-28_5e7080ef6f95218618250291824c02d7_bazarloader_icedid.exe 6601333301⤵PID:704