Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 02:29

General

  • Target

    81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll

  • Size

    750KB

  • MD5

    81390a1eab7befbdaef6645bfe138454

  • SHA1

    3194e80ee05a954d9f03ace38df627ca46fde74a

  • SHA256

    71ad79da21c462fb4b1f0d701c32e8399aae10c5e0e42b739cc315944358bb1b

  • SHA512

    725252f505f5cf17849f06278c2633f879182472f062b1f6ee7b644067e9204a3cc640f95e49a6e7b70b79e47ecf8c78ecd4172400ef352bb52326afb3960f19

  • SSDEEP

    12288:t7ASPjg9Pd50l3o0x4ckVEjfzOd2PaaqySjy/sB2Tx3Znze:VASPk9l+PaRy/swTx1e

Malware Config

Extracted

Family

bazarloader

C2

178.128.165.179

157.230.121.131

167.172.42.125

134.122.62.33

blackrain15.bazar

reddew28c.bazar

bluehail.bazar

whitestorm9p.bazar

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazarloader family
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Windows\system32\cmd.exe
      cmd /c timeout 10 /nobreak > NUL & "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 pfabigas liarrrav & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Windows\system32\timeout.exe
        timeout 10 /nobreak
        3⤵
        • Delays execution with timeout.exe
        PID:4620
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\81390a1eab7befbdaef6645bfe138454_JaffaCakes118.dll", #1 pfabigas liarrrav
        3⤵
          PID:3848

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3848-5-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/3848-6-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/4040-0-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/4040-1-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/4040-2-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB

    • memory/4040-3-0x0000000180000000-0x000000018001F000-memory.dmp

      Filesize

      124KB