Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
21f55d7dfe9c8034421bd57771e16dd7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
21f55d7dfe9c8034421bd57771e16dd7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
21f55d7dfe9c8034421bd57771e16dd7_JaffaCakes118.exe
-
Size
394KB
-
MD5
21f55d7dfe9c8034421bd57771e16dd7
-
SHA1
b5ee060ce2d02ee527b27e3252b6c0865524a5bb
-
SHA256
7b86d02140dd6e4b537d1ca6a7a7ec8df70caaece6db092b13da58633f055f9d
-
SHA512
d798cab09ce5f62f0bedfa8d816cf828becb5910ac5e2f92477e2c5f9857d286586da67d60ad863a5a820146c52b25ea8060d15efff21bece0687dcb3815bbc8
-
SSDEEP
6144:CmagLVRo82R4PU+ZLNbqSOzeoKcV9JR994ymUAV4gSrf8/Ud3dybsuDZMzsfm:rlVGzwBbqNV7XN84g+iUGguDZUse
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2700-9-0x0000000000430000-0x000000000046A000-memory.dmp BazarLoaderVar4 behavioral1/memory/2700-4-0x0000000180000000-0x000000018003F000-memory.dmp BazarLoaderVar4 behavioral1/memory/2700-0-0x0000000000470000-0x00000000004AC000-memory.dmp BazarLoaderVar4