Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 22:30

General

  • Target

    f479a0b3c07a701127b732968a321645_JaffaCakes118.dll

  • Size

    579KB

  • MD5

    f479a0b3c07a701127b732968a321645

  • SHA1

    27e3ca5b22353a9ed97c4326cb26fa96cdeea36e

  • SHA256

    43f8a66d3f3f1ba574bc932a7bc8e5886fbeeab0b279d1dea654d7119e80a494

  • SHA512

    3b05157335985ff2c3563f8a350d3f45a6c7ef2ac8b0d4c76f350f1df39e30f8f5d7477218f0cb24601b17811a53a2ffdc036186822372c978965ab48d506564

  • SSDEEP

    12288:QdhUIE5cQ0FMXiFL+DgpdjFlisGhYEpDfRLYxL67dn:C4NeMy9+spdjFUjJ5

Malware Config

Extracted

Family

bazarloader

C2

164.90.226.23

164.90.236.133

blackrain15.bazar

reddew28c.bazar

whitestorm9p.bazar

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 5 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f479a0b3c07a701127b732968a321645_JaffaCakes118.dll
    1⤵
      PID:2248
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\f479a0b3c07a701127b732968a321645_JaffaCakes118.dll,DllRegisterServer {D9699F66-272F-4AA9-AA17-7A2415C3142A}
      1⤵
        PID:400

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/400-3-0x0000000180000000-0x0000000180017000-memory.dmp
        Filesize

        92KB

      • memory/400-4-0x0000000180000000-0x0000000180017000-memory.dmp
        Filesize

        92KB

      • memory/2248-0-0x0000000180000000-0x0000000180017000-memory.dmp
        Filesize

        92KB

      • memory/2248-1-0x0000000180000000-0x0000000180017000-memory.dmp
        Filesize

        92KB

      • memory/2248-5-0x0000000180000000-0x0000000180017000-memory.dmp
        Filesize

        92KB