Summary | ZeroBOX

temp.dll

BazarLoader TA551 PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 29, 2021, 3:01 p.m. Oct. 29, 2021, 3:03 p.m.
Size 133.5KB
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 cd3e23cddeb92b7397eaf960da34c237
SHA256 b2a4b60dd0c7e9dfa6d88e9badad810ff74c5f42054b7af22e95fb5553d67331
CRC32 07A64CB4
ssdeep 3072:bKfk4isEZeMyM0BsEkxyzPZzihfXSO5vNFYVtZakBLj8fMTcE1B:mfk4isfNM+XOyzP1ihff3FYVT3JzTV
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • BazarLoader_IN - BazarLoader
  • IsDLL - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: [Y]?
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Y
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Waiting for 9
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: seconds, press CTRL+C to quit ...
console_handle: 0x0000000000000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1760
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001f80000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2944
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001f80000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 620
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001f80000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1304
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001f80000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2072
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000310000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1460
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001c30000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 932
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000410000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1344
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001c30000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0
description rundll32.exe tried to sleep 403 seconds, actually delayed analysis time by 403 seconds
section {u'size_of_data': u'0x0001ba00', u'virtual_address': u'0x00006000', u'entropy': 7.728152878306273, u'name': u'.rdata', u'virtual_size': u'0x0001b91c'} entropy 7.72815287831 description A section with a high entropy has been found
entropy 0.833962264151 description Overall entropy of this PE file is high
cmdline cmd /c ping 192.0.2.123 -n 9 -4 -w 1000 & "C:\Windows\system32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\temp.dll", pogfhgf wdtbkqfe koorgsfd & exit
cmdline ping 192.0.2.123 -n 9 -4 -w 1000
cmdline cmd /c ping 192.0.2.136 -n 5 -w 1000 & "C:\Windows\system32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\temp.dll", htrhrr wdtbkqfe koorgsfd & exit
cmdline ping 192.0.2.136 -n 5 -w 1000
Cynet Malicious (score: 100)
McAfee Artemis!CD3E23CDDEB9
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_70% (W)
Symantec Trojan.Gen.2
Sophos Generic ML PUA (PUA)
TrendMicro TrojanSpy.Win64.BAZARLOADER.YXBJ3Z
McAfee-GW-Edition BehavesLike.Win64.BadFile.cc
FireEye Generic.mg.cd3e23cddeb92b73
Microsoft Trojan:Win64/BazarLoader.MZK!MTB
Fortinet W64/Kryptik.CQV!tr
AVG Win64:MalwareX-gen [Trj]
Avast Win64:MalwareX-gen [Trj]
MaxSecure Trojan.Malware.300983.susgen