Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll
-
Size
346KB
-
MD5
f95d00c769e82fcbe2be8ea0fb275a94
-
SHA1
3ffb7d2d42742c61959ec7b0d0191790c1fcc6ae
-
SHA256
589080806a5379da58c79933109de342072b9bad6ee20318c97189ac757d663a
-
SHA512
805d1d88a64510f9e0a8929df5a7f63fac43ad88a3de44d1dfc4eab19a36148a811e1d06d901f3cc7d7f0dc79bd9807e5d2275551a283956c960dc32e1ec8672
-
SSDEEP
6144:YUeWccBLr8Bc/c7dDcKEoBedhs4LNyhMJNx5:rXfBLr8ZCdhs6JX5
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2840-0-0x00000000001C0000-0x00000000001E5000-memory.dmp BazarLoaderVar6 behavioral1/memory/2444-1-0x00000000006B0000-0x00000000006D5000-memory.dmp BazarLoaderVar6 behavioral1/memory/2444-2-0x00000000006B0000-0x00000000006D5000-memory.dmp BazarLoaderVar6 behavioral1/memory/2840-3-0x00000000001C0000-0x00000000001E5000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll1⤵PID:2840
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll,StartW 39364156411⤵PID:2444