Analysis
-
max time kernel
93s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
21051288afbc3354848d9de9e06f7fea_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21051288afbc3354848d9de9e06f7fea_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
21051288afbc3354848d9de9e06f7fea_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
21051288afbc3354848d9de9e06f7fea
-
SHA1
455f634ca8e736545d10948a0ac4b9636cb58b06
-
SHA256
e05fac140f7c39e1cd709eb3f134bde356415500c670e4db9ce74d40a075182f
-
SHA512
c7488c8aaf483790dfe42726cf05668effada155fa35953c00f0866a528d170bd01fc22bcf08f84472d7ddc54f08baacb445693c6fbef2611145f0b94d1ae31e
-
SSDEEP
24576:TqSPG9Jg6TYbmGBtf9efojVpVwKYs1tRCS7SPFL3EOGTWqG5QVEzAJ24GOy2ioLI:TyWbmGBtf9efojVpVwKYs1tR/7SPFL3l
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 5 IoCs
resource yara_rule behavioral2/memory/856-0-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/856-1-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/3668-3-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/3668-4-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/856-5-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\21051288afbc3354848d9de9e06f7fea_JaffaCakes118.dll1⤵PID:856
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\21051288afbc3354848d9de9e06f7fea_JaffaCakes118.dll,DllRegisterServer {D76CC3CB-5C86-4D0A-9C23-1E0CEFDB1D9D}1⤵PID:3668