Summary | ZeroBOX

temp.dll

BazarLoader TA551 PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 29, 2021, 6:30 p.m. Oct. 29, 2021, 6:32 p.m.
Size 133.5KB
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 388c3456276b8e6e9fa8a827c4f37a76
SHA256 150db989523abcb3ea71fdc587015b6121a382ab0e01f5d1bd72a6164b323bcb
CRC32 57BD144B
ssdeep 3072:bXCWDCvw5bQ0zvSSOap/I9ypqtbspoEXtc+pk32ONPESAJvSkYA9:jCWDCviQk3BTsbsp83sSAlSM
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • BazarLoader_IN - BazarLoader
  • IsDLL - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 3044
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001c10000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2712
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000680000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2400
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000460000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001c10000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2748
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001c10000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2736
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000002f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 264
region_size: 126976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001c10000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0
description rundll32.exe tried to sleep 478 seconds, actually delayed analysis time by 478 seconds
section {u'size_of_data': u'0x0001ba00', u'virtual_address': u'0x00006000', u'entropy': 7.734400970796314, u'name': u'.rdata', u'virtual_size': u'0x0001b91c'} entropy 7.7344009708 description A section with a high entropy has been found
entropy 0.833962264151 description Overall entropy of this PE file is high
cmdline ping 192.0.2.8 -n 6 -w 1000
cmdline cmd /c ping 192.0.2.17 -n 10 -i 28 -4 -w 1000 & "C:\Windows\system32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\temp.dll", cxzasada wdtbkqfe koorgsfd & exit
cmdline cmd /c ping 192.0.2.8 -n 6 -w 1000 > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\temp.dll", nvqqws wdtbkqfe koorgsfd & exit
cmdline ping 192.0.2.17 -n 10 -i 28 -4 -w 1000
cmdline cmd /c ping 127.0.0.1 -n 10 -w 1000 > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\temp.dll", ClearNode wdtbkqfe koorgsfd & exit
cmdline ping 127.0.0.1 -n 10 -w 1000
Lionic Trojan.Multi.GenericML.4!c
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (W)
Symantec Trojan.Gen.2
Kaspersky UDS:Trojan.Multi.GenericML.xnet
APEX Malicious
TrendMicro TrojanSpy.Win64.BAZARLOADER.YXBJ3Z
McAfee-GW-Edition BehavesLike.Win64.BadFile.cc
FireEye Generic.mg.388c3456276b8e6e
Microsoft Trojan:Win64/BazarLoader.MZK!MTB
Cynet Malicious (score: 100)
McAfee Artemis!388C3456276B
Avast Win64:MalwareX-gen [Trj]
Fortinet W64/Kryptik.CQV!tr
AVG Win64:MalwareX-gen [Trj]
MaxSecure Trojan.Malware.300983.susgen