Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
40b17d4ca83f079cf6b2b09d7a7fd839_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
40b17d4ca83f079cf6b2b09d7a7fd839_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40b17d4ca83f079cf6b2b09d7a7fd839_JaffaCakes118.exe
-
Size
385KB
-
MD5
40b17d4ca83f079cf6b2b09d7a7fd839
-
SHA1
090e82a47b32dc94d71d4c84a3a76d2480589b00
-
SHA256
85ef348d39610c1d5f58e2524c0e929ec815a9fbe1f5924cdef7a0c05e58e5ad
-
SHA512
c5af8f6ae345f453442a3bbe8189c42ad3c7d4d89231607f78a1b6f24173679e38ac08d26294f46de98358b0aa560f33be5708becd2a632f6657c9bbbbc0d995
-
SSDEEP
6144:HF5dJ89Rl3FtuK0cuVxtIIOxK6xOMjKBxMkUcYBMcoPRxDu3fXtjpamF:HFp4Rl36KNoxwxNmBWcYBhdlpF
Malware Config
Signatures
-
Bazar Loader 4 IoCs
Detected loader normally used to deploy BazarBackdoor malware.
description flow ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\SystemCertificates\Root 40b17d4ca83f079cf6b2b09d7a7fd839_JaffaCakes118.exe HTTP URL 68 https://5.182.210.145/api/v10 Process not Found HTTP URL 73 https://5.182.210.145/api/v10 Process not Found HTTP URL 74 https://5.182.210.145/api/v10 Process not Found -
Bazar/Team9 Loader payload 3 IoCs
resource yara_rule behavioral2/memory/3064-4-0x0000000002060000-0x0000000002096000-memory.dmp BazarLoaderVar4 behavioral2/memory/3064-1-0x0000000002020000-0x0000000002054000-memory.dmp BazarLoaderVar4 behavioral2/memory/3064-9-0x00000000009B0000-0x00000000009E2000-memory.dmp BazarLoaderVar4 -
Tries to connect to .bazar domain 3 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
description flow ioc HTTP URL 73 https://5.182.210.145/api/v10 HTTP URL 74 https://5.182.210.145/api/v10 HTTP URL 68 https://5.182.210.145/api/v10