Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll
-
Size
363KB
-
MD5
7162fdf107c2d36f99c59d5435a4d399
-
SHA1
b4ffeac7e7b25409b709377430dfe8821ca21e6e
-
SHA256
1f9f8cf325ff2de752478ff0623086019ebd1ffbce1d1c2f60e0b70149279f10
-
SHA512
4098f01ba4da3742e96a70cf2478c26d8a24db1c97b048d27c40cb4f28c221c180ae356536b5bda41d9d041aa029dc951a90cd7fa038a5a7bc4c4d27a7fa95f8
-
SSDEEP
6144:RM8CPvvwq0YslcteDNCfgQ/Fkp8HuubxwHdy/6E6OuUNkTf:kvvwTYslTMIQQubxTNkD
Malware Config
Extracted
bazarloader
167.172.108.158
64.227.66.10
134.209.91.22
167.172.108.213
blackrain15.bazar
reddew28c.bazar
bluehail.bazar
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tishmjnhioanlnokantlrwudm = "\"C:\\Windows\\system32\\rundll32.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll\", #1 pfabigas lbbuvrfdt pemnpsldukcq" reg.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1092 timeout.exe 572 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1012 rundll32.exe 1012 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
rundll32.execmd.exerundll32.execmd.execmd.exedescription pid process target process PID 3360 wrote to memory of 336 3360 rundll32.exe cmd.exe PID 3360 wrote to memory of 336 3360 rundll32.exe cmd.exe PID 336 wrote to memory of 1092 336 cmd.exe timeout.exe PID 336 wrote to memory of 1092 336 cmd.exe timeout.exe PID 336 wrote to memory of 1012 336 cmd.exe rundll32.exe PID 336 wrote to memory of 1012 336 cmd.exe rundll32.exe PID 1012 wrote to memory of 4424 1012 rundll32.exe cmd.exe PID 1012 wrote to memory of 4424 1012 rundll32.exe cmd.exe PID 4424 wrote to memory of 3348 4424 cmd.exe reg.exe PID 4424 wrote to memory of 3348 4424 cmd.exe reg.exe PID 1012 wrote to memory of 4636 1012 rundll32.exe cmd.exe PID 1012 wrote to memory of 4636 1012 rundll32.exe cmd.exe PID 4636 wrote to memory of 572 4636 cmd.exe timeout.exe PID 4636 wrote to memory of 572 4636 cmd.exe timeout.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\system32\cmd.execmd /c timeout 10 & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll", #1 pfabigas liarrrav & exit2⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\system32\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:1092
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll", #1 pfabigas liarrrav3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\cmd.execmd.exe /c reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v tishmjnhioanlnokantlrwudm /t REG_SZ /d "\"C:\Windows\system32\rundll32.exe\" \"C:\Users\Admin\AppData\Local\Temp\7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll\", #1 pfabigas lbbuvrfdt pemnpsldukcq"4⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\system32\reg.exereg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v tishmjnhioanlnokantlrwudm /t REG_SZ /d "\"C:\Windows\system32\rundll32.exe\" \"C:\Users\Admin\AppData\Local\Temp\7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll\", #1 pfabigas lbbuvrfdt pemnpsldukcq"5⤵
- Adds Run key to start application
- Modifies registry key
PID:3348
-
-
-
C:\Windows\system32\cmd.execmd /c timeout 8 /nobreak > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll", #1 pfabigas lbbuvrfdt pemnpsldukcq & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\system32\timeout.exetimeout 8 /nobreak5⤵
- Delays execution with timeout.exe
PID:572
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3916 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:3416