Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll
-
Size
750KB
-
MD5
81390a1eab7befbdaef6645bfe138454
-
SHA1
3194e80ee05a954d9f03ace38df627ca46fde74a
-
SHA256
71ad79da21c462fb4b1f0d701c32e8399aae10c5e0e42b739cc315944358bb1b
-
SHA512
725252f505f5cf17849f06278c2633f879182472f062b1f6ee7b644067e9204a3cc640f95e49a6e7b70b79e47ecf8c78ecd4172400ef352bb52326afb3960f19
-
SSDEEP
12288:t7ASPjg9Pd50l3o0x4ckVEjfzOd2PaaqySjy/sB2Tx3Znze:VASPk9l+PaRy/swTx1e
Malware Config
Extracted
bazarloader
178.128.165.179
157.230.121.131
167.172.42.125
134.122.62.33
blackrain15.bazar
reddew28c.bazar
bluehail.bazar
whitestorm9p.bazar
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Delays execution with timeout.exe 1 IoCs
pid Process 4620 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4040 wrote to memory of 3524 4040 rundll32.exe 99 PID 4040 wrote to memory of 3524 4040 rundll32.exe 99 PID 3524 wrote to memory of 4620 3524 cmd.exe 101 PID 3524 wrote to memory of 4620 3524 cmd.exe 101 PID 3524 wrote to memory of 3848 3524 cmd.exe 102 PID 3524 wrote to memory of 3848 3524 cmd.exe 102
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\system32\cmd.execmd /c timeout 10 /nobreak > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 pfabigas liarrrav & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\system32\timeout.exetimeout 10 /nobreak3⤵
- Delays execution with timeout.exe
PID:4620
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 pfabigas liarrrav3⤵PID:3848
-
-