Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll
-
Size
750KB
-
MD5
81390a1eab7befbdaef6645bfe138454
-
SHA1
3194e80ee05a954d9f03ace38df627ca46fde74a
-
SHA256
71ad79da21c462fb4b1f0d701c32e8399aae10c5e0e42b739cc315944358bb1b
-
SHA512
725252f505f5cf17849f06278c2633f879182472f062b1f6ee7b644067e9204a3cc640f95e49a6e7b70b79e47ecf8c78ecd4172400ef352bb52326afb3960f19
-
SSDEEP
12288:t7ASPjg9Pd50l3o0x4ckVEjfzOd2PaaqySjy/sB2Tx3Znze:VASPk9l+PaRy/swTx1e
Malware Config
Extracted
bazarloader
178.128.165.179
157.230.121.131
167.172.42.125
134.122.62.33
blackrain15.bazar
reddew28c.bazar
bluehail.bazar
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Delays execution with timeout.exe 1 IoCs
pid Process 2756 timeout.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2780 2612 rundll32.exe 31 PID 2612 wrote to memory of 2780 2612 rundll32.exe 31 PID 2612 wrote to memory of 2780 2612 rundll32.exe 31 PID 2780 wrote to memory of 2756 2780 cmd.exe 33 PID 2780 wrote to memory of 2756 2780 cmd.exe 33 PID 2780 wrote to memory of 2756 2780 cmd.exe 33 PID 2780 wrote to memory of 2056 2780 cmd.exe 34 PID 2780 wrote to memory of 2056 2780 cmd.exe 34 PID 2780 wrote to memory of 2056 2780 cmd.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\cmd.execmd /c timeout 9 > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 wdtbkqfe koorgsfd & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\timeout.exetimeout 93⤵
- Delays execution with timeout.exe
PID:2756
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 wdtbkqfe koorgsfd3⤵PID:2056
-
-