Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9.dll
Resource
win10v2004-20241007-en
General
-
Target
2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9.dll
-
Size
536KB
-
MD5
fe8a0ef0c5c1d5d8dd2517abb69dcdf5
-
SHA1
a75acad19f4be69b0b6870f14e413bb4de06ec73
-
SHA256
2331fa420bee83df1248af48853a6f7748923cdae906b58c43ef8e11c6c72ca9
-
SHA512
a3b046e9f79692e1e9992cfb319820c5be6b44e9478ecd3c5c83c37bdcb0354216a674132e7c75e87998a91d250ae08f7362ee8877144aa1d4b04dda6ba2d775
-
SSDEEP
12288:Zyt/7qSH5Z/zY5wkzg+28UkWotGIDODuIPTr0:ZS/v5iwkzA8UkWMGWOdr0
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Bazar/Team9 Loader payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/808-0-0x000001B8533B0000-0x000001B8533DA000-memory.dmp BazarLoaderVar5 behavioral2/memory/808-1-0x000001B8533B0000-0x000001B8533DA000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 34 808 rundll32.exe 35 808 rundll32.exe 43 808 rundll32.exe 44 808 rundll32.exe 45 808 rundll32.exe 46 808 rundll32.exe -
Tries to connect to .bazar domain 1 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 45 blackrain15.bazar -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 134.195.4.2