Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
8e7b76532c0bb541c727861f74a0b618_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e7b76532c0bb541c727861f74a0b618_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e7b76532c0bb541c727861f74a0b618_JaffaCakes118.exe
-
Size
393KB
-
MD5
8e7b76532c0bb541c727861f74a0b618
-
SHA1
ef0d327aa5969f8ad65ddb7f605d645e3270e64a
-
SHA256
9f7e4c52af1b8afcb06ca88cc726d1e4681b0f87683b04d175bb70be4363d345
-
SHA512
0ccc658a6eb0e4a29e558ffaf800ec8c381621af057134c6b26a944c0fcf1e974a140f45305dedfd1933a3a8466a03fefede278f69bc8762cd56c28f9c28ba6e
-
SSDEEP
6144:e9zgMUl3ABcePxx3K0mh5eu00S4KtDXaXYc+VKT8jHnAqYhf2k8Zl6:ozgTfePvK0mzeu00S4KBaWje2W
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 3 IoCs
resource yara_rule behavioral1/memory/2416-0-0x00000000041E0000-0x000000000421C000-memory.dmp BazarLoaderVar4 behavioral1/memory/2416-4-0x0000000180000000-0x000000018003F000-memory.dmp BazarLoaderVar4 behavioral1/memory/2416-9-0x0000000001CC0000-0x0000000001CFA000-memory.dmp BazarLoaderVar4 -
Tries to connect to .bazar domain 20 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 19 adhhikahjhiq.bazar 29 cehhikcijhiq.bazar 30 cehhikcijhiq.bazar 32 cehhikcijhiq.bazar 38 deegkldiggkr.bazar 20 adhhikahjhiq.bazar 23 adhhikahjhiq.bazar 25 adhhikahjhiq.bazar 31 cehhikcijhiq.bazar 33 cehhikcijhiq.bazar 34 cehhikcijhiq.bazar 35 deegkldiggkr.bazar 36 deegkldiggkr.bazar 21 adhhikahjhiq.bazar 26 adhhikahjhiq.bazar 27 cehhikcijhiq.bazar 28 cehhikcijhiq.bazar 22 adhhikahjhiq.bazar 24 adhhikahjhiq.bazar 37 deegkldiggkr.bazar -
Unexpected DNS network traffic destination 28 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 193.183.98.66 Destination IP 151.80.222.79 Destination IP 94.16.114.254 Destination IP 51.254.25.115 Destination IP 151.80.222.79 Destination IP 151.80.222.79 Destination IP 151.80.222.79 Destination IP 195.10.195.195 Destination IP 176.126.70.119 Destination IP 195.10.195.195 Destination IP 176.126.70.119 Destination IP 95.174.65.241 Destination IP 95.174.65.241 Destination IP 94.16.114.254 Destination IP 195.10.195.195 Destination IP 176.126.70.119 Destination IP 95.174.65.241 Destination IP 192.71.245.208 Destination IP 51.254.25.115 Destination IP 192.71.245.208 Destination IP 94.16.114.254 Destination IP 192.71.245.208 Destination IP 195.10.195.195 Destination IP 192.71.245.208 Destination IP 193.183.98.66 Destination IP 176.126.70.119 Destination IP 51.254.25.115 Destination IP 193.183.98.66