Analysis
-
max time kernel
96s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
7a21ac421ac431d03661d7174979e5779dec4af541e266f0ea26a19464724ba1N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7a21ac421ac431d03661d7174979e5779dec4af541e266f0ea26a19464724ba1N.dll
Resource
win10v2004-20241007-en
General
-
Target
7a21ac421ac431d03661d7174979e5779dec4af541e266f0ea26a19464724ba1N.dll
-
Size
468KB
-
MD5
6ef155a647229c545ff442c277875720
-
SHA1
57bb9742d73637a890353e4d7d304c0cff9e9b6f
-
SHA256
7a21ac421ac431d03661d7174979e5779dec4af541e266f0ea26a19464724ba1
-
SHA512
1498d73914ddab7922d81073153cf266a3dc66fc9f8ff89c3c00635790376781ad4fefce2fc3e927cc36d343dc31c9b280add02bc53357c3a3fb2ae0e325f19c
-
SSDEEP
6144:spcTkE9fx04tFNlbCnZB/eLf2cdw2bnrohbz42D8Mh6kEQi:sWe4tFDbCnDeLnnroxOMokri
Malware Config
Extracted
bazarloader
162.33.179.253
162.33.178.65
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
resource yara_rule behavioral2/memory/4028-0-0x0000000000C60000-0x0000000000C79000-memory.dmp BazarLoaderVar6 behavioral2/memory/2860-1-0x000002A2EAED0000-0x000002A2EAEE9000-memory.dmp BazarLoaderVar6 behavioral2/memory/2860-2-0x000002A2EAED0000-0x000002A2EAEE9000-memory.dmp BazarLoaderVar6 behavioral2/memory/4028-3-0x0000000000C60000-0x0000000000C79000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7a21ac421ac431d03661d7174979e5779dec4af541e266f0ea26a19464724ba1N.dll1⤵PID:4028
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\7a21ac421ac431d03661d7174979e5779dec4af541e266f0ea26a19464724ba1N.dll,DllRegisterServer {454C6754-64DE-4A36-A7B3-8BE448013B5A}1⤵PID:2860