Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll
-
Size
346KB
-
MD5
f95d00c769e82fcbe2be8ea0fb275a94
-
SHA1
3ffb7d2d42742c61959ec7b0d0191790c1fcc6ae
-
SHA256
589080806a5379da58c79933109de342072b9bad6ee20318c97189ac757d663a
-
SHA512
805d1d88a64510f9e0a8929df5a7f63fac43ad88a3de44d1dfc4eab19a36148a811e1d06d901f3cc7d7f0dc79bd9807e5d2275551a283956c960dc32e1ec8672
-
SSDEEP
6144:YUeWccBLr8Bc/c7dDcKEoBedhs4LNyhMJNx5:rXfBLr8ZCdhs6JX5
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
resource yara_rule behavioral2/memory/4792-0-0x0000000002590000-0x00000000025B5000-memory.dmp BazarLoaderVar6 behavioral2/memory/2500-1-0x000002DD6FF20000-0x000002DD6FF45000-memory.dmp BazarLoaderVar6 behavioral2/memory/2500-2-0x000002DD6FF20000-0x000002DD6FF45000-memory.dmp BazarLoaderVar6 behavioral2/memory/4792-3-0x0000000002590000-0x00000000025B5000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll1⤵PID:4792
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\f95d00c769e82fcbe2be8ea0fb275a94_JaffaCakes118.dll,StartW 38447651⤵PID:2500