Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
6320a11b8740b2a6ef0c13457ab8933c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6320a11b8740b2a6ef0c13457ab8933c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6320a11b8740b2a6ef0c13457ab8933c_JaffaCakes118.exe
-
Size
501KB
-
MD5
6320a11b8740b2a6ef0c13457ab8933c
-
SHA1
f9ecc55dd25ee71f44f5b401d2e3177a2b93acc5
-
SHA256
c6964b25bb2cb50f34145266c6143c96c530690274270058551e67ab5676e9b6
-
SHA512
9ab6ad2b45066daeccc37ccf46b94bff30b6cac71318dacdd8f7b4c6a2d81f24e23575851591a9d9ebf84e5c55cd90b7d3effc46c1dc8d0ac63a64d517e1e184
-
SSDEEP
6144:uL6vscN55Znu5qk7iVsMqYAqfyfzT4gXdAfnqUmDSaIukprGWSFQy56PE+tRh5ek:uL6EeV7fug3qpRW1bPEH9ajRrn
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2016-1-0x0000000000340000-0x000000000037C000-memory.dmp BazarLoaderVar4 behavioral1/memory/2016-4-0x0000000180000000-0x000000018003F000-memory.dmp BazarLoaderVar4 behavioral1/memory/2016-8-0x0000000000200000-0x000000000023A000-memory.dmp BazarLoaderVar4