Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
f829e1a9cf136d94f832c275f6d1f008_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f829e1a9cf136d94f832c275f6d1f008_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
f829e1a9cf136d94f832c275f6d1f008_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
f829e1a9cf136d94f832c275f6d1f008
-
SHA1
6f695e3924dbb1d6d216250ea8da39987a70cf4b
-
SHA256
2c59b6a90799fe245b4bcd608bab37b0a3750bacaa886eda9c1e32c9e8b6f84f
-
SHA512
d8f3f5cc1a8e616515f9cf5bb6934fa6c6627a16713bbefdcf7d81ecaf4f41b657490759ae089fdeaac5f960d19acd92dd25bf9385189c0b37a13ff7048bacd8
-
SSDEEP
12288:6yWeahQ/LWnzkXz5HYrniajhuSlHJzJBlPXXo/6aNdCaBSPZC1XZV72B4:HWeaZzqY7dhBjz/lfo/FIyXv72B4
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Bazar/Team9 Loader payload 2 IoCs
resource yara_rule behavioral1/memory/1780-0-0x0000000001E30000-0x0000000001E6C000-memory.dmp BazarLoaderVar5 behavioral1/memory/1780-2-0x0000000001E30000-0x0000000001E6C000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 7 IoCs
flow pid Process 2 1780 rundll32.exe 3 1780 rundll32.exe 6 1780 rundll32.exe 9 1780 rundll32.exe 10 1780 rundll32.exe 13 1780 rundll32.exe 14 1780 rundll32.exe