Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 07:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5445015ef22231e3dc5259003c226e21.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5445015ef22231e3dc5259003c226e21.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5445015ef22231e3dc5259003c226e21.dll
-
Size
840KB
-
MD5
5445015ef22231e3dc5259003c226e21
-
SHA1
0757012f58aa5e2d0924da7aa8143a6563c734d7
-
SHA256
3322696190c1ff3186a95bee9c3bda907c1297518fd278e7ce209d92e461b863
-
SHA512
42bdba9fd13386e02d02dd3dce60c0dc32c4248b8659e45e2c10d7ef8512d7638927628ae8e19e31beb20d4f8393abad086ef014b5b4a61c4873724d26562eec
-
SSDEEP
12288:Y0DgYq89aJyKXwAmliposlBT0sVxVTrU7RnVhGqYtZsUSdEPG0:Y0DgRiUAzFsD35TrU7RnzS3sUc0
Malware Config
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Bazarloader family
-
Bazar/Team9 Loader payload 3 IoCs
resource yara_rule behavioral2/memory/4304-1-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar5 behavioral2/memory/4304-0-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar5 behavioral2/memory/4304-2-0x0000000180000000-0x0000000180034000-memory.dmp BazarLoaderVar5 -
Tries to connect to .bazar domain 2 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
flow ioc 48 reddew28c.bazar 51 bluehail.bazar -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 130.61.64.122 Destination IP 130.61.64.122