Analysis

  • max time kernel
    134s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2024 23:31

General

  • Target

    9a1725b1db1d41e3718526e265a8c6fb_JaffaCakes118.dll

  • Size

    355KB

  • MD5

    9a1725b1db1d41e3718526e265a8c6fb

  • SHA1

    3f38ead3e0ce0d8ae516465e2bcad43cf1dd8970

  • SHA256

    e31898f207733cf33a6f951d8337d6cd303334a9df95956686657e3f13436ae8

  • SHA512

    142ef77760974c044061214dce1597599315ea08ffe12627500d3a0f71e8b290e33a3d97372439f3b01f57f2282549ce7143b033180e2584b56e25ab99e60bc7

  • SSDEEP

    6144:BeiSscyk7I05DgnncrqB4MKqeuR9pO0iS2TBBQxKMedx2isuXuKnJtyK5iHI:zl12TAisuX/Jtd

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 2 IoCs
  • Blocklisted process makes network request 14 IoCs
  • Tries to connect to .bazar domain 4 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a1725b1db1d41e3718526e265a8c6fb_JaffaCakes118.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2440-0-0x0000000180000000-0x000000018002A000-memory.dmp

    Filesize

    168KB

  • memory/2440-1-0x0000000180000000-0x000000018002A000-memory.dmp

    Filesize

    168KB