Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2024 10:28

General

  • Target

    40b17d4ca83f079cf6b2b09d7a7fd839_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    40b17d4ca83f079cf6b2b09d7a7fd839

  • SHA1

    090e82a47b32dc94d71d4c84a3a76d2480589b00

  • SHA256

    85ef348d39610c1d5f58e2524c0e929ec815a9fbe1f5924cdef7a0c05e58e5ad

  • SHA512

    c5af8f6ae345f453442a3bbe8189c42ad3c7d4d89231607f78a1b6f24173679e38ac08d26294f46de98358b0aa560f33be5708becd2a632f6657c9bbbbc0d995

  • SSDEEP

    6144:HF5dJ89Rl3FtuK0cuVxtIIOxK6xOMjKBxMkUcYBMcoPRxDu3fXtjpamF:HFp4Rl36KNoxwxNmBWcYBhdlpF

Malware Config

Signatures

  • Bazar Loader 4 IoCs

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 3 IoCs
  • Tries to connect to .bazar domain 3 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40b17d4ca83f079cf6b2b09d7a7fd839_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\40b17d4ca83f079cf6b2b09d7a7fd839_JaffaCakes118.exe"
    1⤵
    • Bazar Loader
    PID:3064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3064-4-0x0000000002060000-0x0000000002096000-memory.dmp

    Filesize

    216KB

  • memory/3064-1-0x0000000002020000-0x0000000002054000-memory.dmp

    Filesize

    208KB

  • memory/3064-9-0x00000000009B0000-0x00000000009E2000-memory.dmp

    Filesize

    200KB