Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 19:23
Behavioral task
behavioral1
Sample
1423a4be112f647fe95730150a842627_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
1423a4be112f647fe95730150a842627_JaffaCakes118.exe
-
Size
348KB
-
MD5
1423a4be112f647fe95730150a842627
-
SHA1
ad705962c70d6d74afc7f69051c809240c1dc7d3
-
SHA256
7655e16003aa8856e7585f5d4b76d39f9e56b784442c9523d9f0b7b9c85b714b
-
SHA512
0df8a840711259c5026d20c069e45a996aa92e821ac870d0ae66760617e31ce5feecbdf3b03a16f3945b13df1279c1902c9a46c498b0b235217e127e49157cb0
-
SSDEEP
6144:b+NHXf500MwDjCTHYr1b8i4YunbL/zMoXDme:6d50sjGoP4YunHAoXDme
Malware Config
Extracted
quasar
1.3.0.0
Slave
134.209.192.40:4782
QSR_MUTEX_k8JOK9yrF6X0eZEc1V
-
encryption_key
Mx5vn03LCy6ul2fLffQw
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Processes:
flow ioc 41 ip-api.com 44 ip-api.com -
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5104-1-0x0000000000360000-0x00000000003BE000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
Client.exepid process 4772 Client.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 41 ip-api.com 44 ip-api.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1423a4be112f647fe95730150a842627_JaffaCakes118.exeClient.exedescription pid process Token: SeDebugPrivilege 5104 1423a4be112f647fe95730150a842627_JaffaCakes118.exe Token: SeDebugPrivilege 4772 Client.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1423a4be112f647fe95730150a842627_JaffaCakes118.exedescription pid process target process PID 5104 wrote to memory of 4772 5104 1423a4be112f647fe95730150a842627_JaffaCakes118.exe Client.exe PID 5104 wrote to memory of 4772 5104 1423a4be112f647fe95730150a842627_JaffaCakes118.exe Client.exe PID 5104 wrote to memory of 4772 5104 1423a4be112f647fe95730150a842627_JaffaCakes118.exe Client.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1423a4be112f647fe95730150a842627_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1423a4be112f647fe95730150a842627_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3020 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
348KB
MD51423a4be112f647fe95730150a842627
SHA1ad705962c70d6d74afc7f69051c809240c1dc7d3
SHA2567655e16003aa8856e7585f5d4b76d39f9e56b784442c9523d9f0b7b9c85b714b
SHA5120df8a840711259c5026d20c069e45a996aa92e821ac870d0ae66760617e31ce5feecbdf3b03a16f3945b13df1279c1902c9a46c498b0b235217e127e49157cb0
-
memory/4772-19-0x0000000006C90000-0x0000000006C9A000-memory.dmpFilesize
40KB
-
memory/4772-18-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/4772-15-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/4772-14-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/5104-4-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/5104-6-0x0000000004D80000-0x0000000004DE6000-memory.dmpFilesize
408KB
-
memory/5104-7-0x0000000005300000-0x0000000005312000-memory.dmpFilesize
72KB
-
memory/5104-8-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/5104-9-0x0000000006000000-0x000000000603C000-memory.dmpFilesize
240KB
-
memory/5104-5-0x0000000074DCE000-0x0000000074DCF000-memory.dmpFilesize
4KB
-
memory/5104-0-0x0000000074DCE000-0x0000000074DCF000-memory.dmpFilesize
4KB
-
memory/5104-3-0x0000000004E20000-0x0000000004EB2000-memory.dmpFilesize
584KB
-
memory/5104-17-0x0000000074DC0000-0x0000000075570000-memory.dmpFilesize
7.7MB
-
memory/5104-2-0x0000000005330000-0x00000000058D4000-memory.dmpFilesize
5.6MB
-
memory/5104-1-0x0000000000360000-0x00000000003BE000-memory.dmpFilesize
376KB