Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 03:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_774b4f307e5d546d3fed89eaa69c7689.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_774b4f307e5d546d3fed89eaa69c7689.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_774b4f307e5d546d3fed89eaa69c7689.dll
-
Size
536KB
-
MD5
774b4f307e5d546d3fed89eaa69c7689
-
SHA1
382c1e3b75d68bcf11679b16ee1ac589b3b94519
-
SHA256
b85a259abb357649a86a54681283820624e161ec2334707546e29998af231316
-
SHA512
c4c8b6cf113fe67de358c677d13828539c51ce7ba594d368131d247f72c00db23c511d6681e2380eb5a620ab7b993e9ae5d880f075c7d2ed65e7ffea2d2b0a9f
-
SSDEEP
12288:2d6RYg1Xc5E7lrYedtkot366KfwiY/Bs7h/M:C6/t7lrYedtkMn/Bsi
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Bazar/Team9 Loader payload 2 IoCs
resource yara_rule behavioral2/memory/4972-0-0x0000027915A30000-0x0000027915A5A000-memory.dmp BazarLoaderVar5 behavioral2/memory/4972-1-0x0000027915A30000-0x0000027915A5A000-memory.dmp BazarLoaderVar5 -
Blocklisted process makes network request 15 IoCs
flow pid Process 37 4972 rundll32.exe 38 4972 rundll32.exe 42 4972 rundll32.exe 46 4972 rundll32.exe 48 4972 rundll32.exe 49 4972 rundll32.exe 51 4972 rundll32.exe 52 4972 rundll32.exe 53 4972 rundll32.exe 54 4972 rundll32.exe 55 4972 rundll32.exe 56 4972 rundll32.exe 57 4972 rundll32.exe 67 4972 rundll32.exe 68 4972 rundll32.exe -
Tries to connect to .bazar domain 8 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 53 reddew28c.bazar 54 reddew28c.bazar 55 reddew28c.bazar 56 reddew28c.bazar 67 bluehail.bazar 48 blackrain15.bazar 51 reddew28c.bazar 52 reddew28c.bazar -
Unexpected DNS network traffic destination 8 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 78.31.67.99 Destination IP 88.198.92.222 Destination IP 134.195.4.2 Destination IP 134.195.4.2 Destination IP 134.195.4.2 Destination IP 35.211.96.150 Destination IP 192.3.165.37 Destination IP 103.138.238.151