Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
4fd5679a0c8bb691460d2f21b6bf95fd_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4fd5679a0c8bb691460d2f21b6bf95fd_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
4fd5679a0c8bb691460d2f21b6bf95fd_JaffaCakes118.dll
-
Size
288KB
-
MD5
4fd5679a0c8bb691460d2f21b6bf95fd
-
SHA1
3445ed787e6e03184a74b7d9a293f898768ac688
-
SHA256
22498b7c26cdac972970888ee454f331b74a96977478abf0ad85a0e6c9f8bb53
-
SHA512
702860ccc1931f0c3d103ac739bf294050f9839118b09173806cf8d74e4970224bfdfeb8a636c07be114944fa8969c179defcb5a1f009493a68c01cb7fca3317
-
SSDEEP
3072:p6QlU5T0+vk+wYDgN3XwmbvV4Ynnbe9rhNifQMpnIjZ9jAPUn4CbwKL0Fo3dgqTy:pXEwZSZeKZVA6BNL0F1h31eMgIf/
Malware Config
Extracted
bazarloader
128.199.54.51
161.35.152.204
161.35.95.166
whitestorm9p.bazar
yellowdownpour81.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazar/Team9 Loader payload 4 IoCs
resource yara_rule behavioral2/memory/4092-0-0x00000000026F0000-0x00000000027CC000-memory.dmp BazarLoaderVar6 behavioral2/memory/4092-3-0x00000000026F0000-0x00000000027CC000-memory.dmp BazarLoaderVar6 behavioral2/memory/4632-4-0x000001C78E440000-0x000001C78E51C000-memory.dmp BazarLoaderVar6 behavioral2/memory/4632-5-0x000001C78E440000-0x000001C78E51C000-memory.dmp BazarLoaderVar6
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4fd5679a0c8bb691460d2f21b6bf95fd_JaffaCakes118.dll1⤵PID:4092
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\4fd5679a0c8bb691460d2f21b6bf95fd_JaffaCakes118.dll,StartW {06D3E750-8DA8-439A-98FC-1A661ADE58E7}1⤵PID:4632