Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 02:29

General

  • Target

    81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll

  • Size

    750KB

  • MD5

    81390a1eab7befbdaef6645bfe138454

  • SHA1

    3194e80ee05a954d9f03ace38df627ca46fde74a

  • SHA256

    71ad79da21c462fb4b1f0d701c32e8399aae10c5e0e42b739cc315944358bb1b

  • SHA512

    725252f505f5cf17849f06278c2633f879182472f062b1f6ee7b644067e9204a3cc640f95e49a6e7b70b79e47ecf8c78ecd4172400ef352bb52326afb3960f19

  • SSDEEP

    12288:t7ASPjg9Pd50l3o0x4ckVEjfzOd2PaaqySjy/sB2Tx3Znze:VASPk9l+PaRy/swTx1e

Malware Config

Extracted

Family

bazarloader

C2

178.128.165.179

157.230.121.131

167.172.42.125

134.122.62.33

blackrain15.bazar

reddew28c.bazar

bluehail.bazar

whitestorm9p.bazar

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazarloader family
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\system32\cmd.exe
      cmd /c timeout 9 > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 wdtbkqfe koorgsfd & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\system32\timeout.exe
        timeout 9
        3⤵
        • Delays execution with timeout.exe
        PID:2756
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 wdtbkqfe koorgsfd
        3⤵
          PID:2056

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2056-5-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/2056-6-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/2612-0-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/2612-1-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/2612-2-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/2612-3-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB