Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2704c6fab698d1b402a4782a0a7ebd54.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2704c6fab698d1b402a4782a0a7ebd54.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2704c6fab698d1b402a4782a0a7ebd54.dll
-
Size
538KB
-
MD5
2704c6fab698d1b402a4782a0a7ebd54
-
SHA1
b17f9009c27fdd40bea3e824033a5279022d786c
-
SHA256
d704e7823e94548dc72aec27bd98acd97ba3374ba68f3606c0f0fe59543cf92e
-
SHA512
f4e677b43e817c0f7e09977e6871a61e60317838b87a0acbcbd679be28395dd8ca1a051f1a761e88cfd478a74eaecff1c6d3a3cbd023ac6c1f692001b5009e05
-
SSDEEP
12288:x5uCK9y+fJYzgiiUl8KbcoV6lXbBu+yvIgLQJ0x6YarFtoG:x4Ci8giiUl8KbckmwIgLQJ0x6KG
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Bazar/Team9 Loader payload 2 IoCs
resource yara_rule behavioral2/memory/656-0-0x000002377BA80000-0x000002377BAAA000-memory.dmp BazarLoaderVar5 behavioral2/memory/656-1-0x000002377BA80000-0x000002377BAAA000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 2 IoCs
flow pid Process 43 656 rundll32.exe 44 656 rundll32.exe