Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
3f66f504089436cd6c8f8a55d95bc5d0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f66f504089436cd6c8f8a55d95bc5d0_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3f66f504089436cd6c8f8a55d95bc5d0_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
3f66f504089436cd6c8f8a55d95bc5d0
-
SHA1
e102d97375c06e51513e324188748cdd604085a6
-
SHA256
4d8b8799835550d0d7a6036135407dae5940341185a84ef917fbcc48c0e5bd42
-
SHA512
7045a06767165235bf3506b003267d645a449b941820d121f48c06b6c17bd29fa05bfc639a0983b597e6c4e15e6a1460cf56ee4b6532a26e6c84bd002fdcd5d3
-
SSDEEP
24576:TqSPG9Jg6TYbmGBtf9efojVpVwKYs1tRCS7SPFL3EOGTWqG5QVEzAJ24GOy2ioL4:TyWbmGBtf9efojVpVwKYs1tR/7SPFL3d
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 5 IoCs
resource yara_rule behavioral2/memory/3216-0-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/3216-1-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/2984-3-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/2984-4-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6 behavioral2/memory/3216-5-0x0000000180000000-0x0000000180019000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3f66f504089436cd6c8f8a55d95bc5d0_JaffaCakes118.dll1⤵PID:3216
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\3f66f504089436cd6c8f8a55d95bc5d0_JaffaCakes118.dll,DllRegisterServer {50EDCF38-00BA-49E4-858F-4A7DC379E843}1⤵PID:2984