Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:32

General

  • Target

    eaad7777d588deef9db962f2863f8b9b_JaffaCakes118.exe

  • Size

    393KB

  • MD5

    eaad7777d588deef9db962f2863f8b9b

  • SHA1

    3609ee852faacc43b5ed92f722405c7421e6ceac

  • SHA256

    a3064bed5b34056187313decc580ff2bcb22724202f8add0d0e836ed7cfd91ac

  • SHA512

    06bf19aa087998c4cbb4ceaad5cff8fead8e9cec36dd046bd78a7b8530030aafa88f23dd2eae72391adfc75027691b348e7932a3829cd49c9f98a49531902ead

  • SSDEEP

    6144:m9MgMUl3ABcePxL2HH30NMOLLfvSmgpJUXiuDVl0fEyFBEilIsdrFrY:QMgTfePMX0mOHf5zDvWIGFrY

Malware Config

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 3 IoCs
  • Tries to connect to .bazar domain 64 IoCs

    Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaad7777d588deef9db962f2863f8b9b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaad7777d588deef9db962f2863f8b9b_JaffaCakes118.exe"
    1⤵
      PID:588

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/588-4-0x0000000180000000-0x000000018003F000-memory.dmp

      Filesize

      252KB

    • memory/588-9-0x0000000001C30000-0x0000000001C6A000-memory.dmp

      Filesize

      232KB

    • memory/588-0-0x0000000001C70000-0x0000000001CAC000-memory.dmp

      Filesize

      240KB