Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
f8fc113257931a242e05e8ff1bbf6f4e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8fc113257931a242e05e8ff1bbf6f4e_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
f8fc113257931a242e05e8ff1bbf6f4e_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f8fc113257931a242e05e8ff1bbf6f4e
-
SHA1
7ceba552d12287198835472c7f56132a56568c7d
-
SHA256
3a1434c46c588441cecde2d684b320ac38473c775449def61affc37a1a57eeea
-
SHA512
dd7218dd2194d44d66579d5100e11236d86ec4eea2549e4daf1ee893c338f7f1d6487c75acd6cdc7395783db073feca074e7e87d59c2f0ab40b12f048760c558
-
SSDEEP
24576:0Wpc+G43nwqthqmmldpXoQ5IyXdLrgvHmrc:8+n3Hthqm9qgkc
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 3 IoCs
resource yara_rule behavioral2/memory/1448-0-0x000001FF254A0000-0x000001FF254DB000-memory.dmp BazarLoaderVar5 behavioral2/memory/1448-1-0x00007FFFA5BC0000-0x00007FFFA5D42000-memory.dmp BazarLoaderVar5 behavioral2/memory/1448-3-0x000001FF254A0000-0x000001FF254DB000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 11 IoCs
flow pid Process 16 1448 rundll32.exe 43 1448 rundll32.exe 47 1448 rundll32.exe 49 1448 rundll32.exe 52 1448 rundll32.exe 53 1448 rundll32.exe 54 1448 rundll32.exe 65 1448 rundll32.exe 66 1448 rundll32.exe 73 1448 rundll32.exe 74 1448 rundll32.exe -
Tries to connect to .bazar domain 3 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 53 greencloud46a.bazar 65 whitestorm9p.bazar 73 yellowdownpour81.bazar -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 195.10.195.195 Destination IP 195.10.195.195 Destination IP 195.10.195.195 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
description flow ioc HTTP URL 47 https://api.opennicproject.org/geoip/?bare&ipv=4
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8fc113257931a242e05e8ff1bbf6f4e_JaffaCakes118.dll,#11⤵
- Blocklisted process makes network request
PID:1448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:848