Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2024 14:04

General

  • Target

    951acc18e4f14471f49235327e0c1ccc_JaffaCakes118.exe

  • Size

    569KB

  • MD5

    951acc18e4f14471f49235327e0c1ccc

  • SHA1

    7fbe0b3af47957234f3fe22ae9de37ea7416c573

  • SHA256

    09557d538aee094d168a4b4fb5174d742fe81dd59dd27e2eee078fb3f10d9017

  • SHA512

    779b99299928b64eb777cec3c92364e1e7bb30f6192a88773d2521c6dc3a5000062a26418069819e4590b85d717041553aed214dc4ac68fa74825f6b565e25f7

  • SSDEEP

    6144:wV11/Zb2BpZwQwu24P02TbE4xVP30UgvzVUc:wv1/Z3Q0WE4f/3yZN

Malware Config

Signatures

  • Bazar Loader 4 IoCs

    Detected loader normally used to deploy BazarBackdoor malware.

  • Tries to connect to .bazar domain 3 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\951acc18e4f14471f49235327e0c1ccc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\951acc18e4f14471f49235327e0c1ccc_JaffaCakes118.exe"
    1⤵
    • Bazar Loader
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:2220

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-0-0x00000000005D0000-0x00000000005F8000-memory.dmp
    Filesize

    160KB

  • memory/2220-5-0x0000000180000000-0x000000018002A000-memory.dmp
    Filesize

    168KB

  • memory/2220-9-0x00000000005A0000-0x00000000005C6000-memory.dmp
    Filesize

    152KB

  • memory/2220-12-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB

  • memory/2220-11-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB

  • memory/2220-10-0x0000000077C11000-0x0000000077C12000-memory.dmp
    Filesize

    4KB

  • memory/2220-14-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB

  • memory/2220-16-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB

  • memory/2220-15-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB

  • memory/2220-17-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB

  • memory/2220-18-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB

  • memory/2220-34-0x0000000077BC0000-0x0000000077D69000-memory.dmp
    Filesize

    1.7MB