Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
0abb954a9e4f397059d71a217f8a19d3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0abb954a9e4f397059d71a217f8a19d3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0abb954a9e4f397059d71a217f8a19d3_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
0abb954a9e4f397059d71a217f8a19d3
-
SHA1
63beb413c82fe468995ebba7b0aec139a03068ec
-
SHA256
c46a26fe6815d764248bc8932df560ace65404fdffa3674e946e045be196a2ae
-
SHA512
b0225e80f6ffe6a77c37510c1a6ef7b297b453afd95fd6dc2fea456bd2ad8bc4b74a07a143e77b21320347568d3d0340df573c256be01efcfb2b0e317b582ebf
-
SSDEEP
24576:TqSPG9Jg6TYbmGBtf9efojVpVwKYs1tRCS7SPFL3EOGTWqG5QVEzAJ24GOy2ioLk:TyWbmGBtf9efojVpVwKYs1tR/7SPFL31
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1180-0-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/1180-1-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/1540-3-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/1540-4-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/1180-5-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0abb954a9e4f397059d71a217f8a19d3_JaffaCakes118.dll1⤵PID:1180
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\0abb954a9e4f397059d71a217f8a19d3_JaffaCakes118.dll,DllRegisterServer {E2E0DC2C-E817-4A8D-AC79-B53D5451A21E}1⤵PID:1540