Analysis
-
max time kernel
93s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
01c709203eddc996c2f3432661ba5316_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01c709203eddc996c2f3432661ba5316_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
01c709203eddc996c2f3432661ba5316_JaffaCakes118.dll
-
Size
323KB
-
MD5
01c709203eddc996c2f3432661ba5316
-
SHA1
b5d5945d2c67824ba084bc0f546511f71677a25e
-
SHA256
cbf60d6fa0473f1a0290e278479a1786daea784d7dc2a63198292f7a9ec1a2a1
-
SHA512
b92ef9637ad8d71cfb5878be83551c31b11b009e5f5643d0a11a91b0ba2cdabb2bb6ad77a6ca65d24a28f33606fa03a2f86038efa50587ddd21fd84b7972f8bd
-
SSDEEP
6144:wXVlSsCrDRKqimtDMCfh55SEYpv0WMIyOzG/fK/rcZMIMhuz:SVavMCfiv0WMIyUGxz
Malware Config
Extracted
bazarloader
128.199.54.51
161.35.152.204
161.35.95.166
whitestorm9p.bazar
yellowdownpour81.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5088-0-0x0000000002790000-0x000000000286C000-memory.dmp BazarLoaderVar6 behavioral2/memory/3952-1-0x0000018BA1430000-0x0000018BA150C000-memory.dmp BazarLoaderVar6 behavioral2/memory/3952-2-0x0000018BA1430000-0x0000018BA150C000-memory.dmp BazarLoaderVar6 behavioral2/memory/5088-3-0x0000000002790000-0x000000000286C000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\01c709203eddc996c2f3432661ba5316_JaffaCakes118.dll1⤵PID:5088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\01c709203eddc996c2f3432661ba5316_JaffaCakes118.dll,StartW {21105E16-B915-42D3-BAA4-6D02EA26037D}1⤵PID:3952