Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 05:35

General

  • Target

    38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe

  • Size

    600KB

  • MD5

    38842bfc2ef9e1a4734a3ac4d4fa0b0d

  • SHA1

    d7702f8f8b6d8baa46c066948b8278bfe868cff5

  • SHA256

    995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824

  • SHA512

    067a32950f8800f2ab64d80c6910abf20e0204457abca4156a5a93624c230720b7904fe48ef26ab2ea15958abdb8a53306513c4db74ca69f02de679c5c360346

  • SSDEEP

    12288:bBU27je2sGbV7LsAlhgLTj9BBnWobokcoyhUvqA2:bBUYje21R0b9BBnWooXhQqA

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

windows security

C2

vilvaraj-32652.portmap.io:32652

Mutex

VNM_MUTEX_XaCO2YtLAsadylDHBP

Attributes
  • encryption_key

    eKgGUbCubcSIafuOAN5V

  • install_name

    windows security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    windows security

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 5 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 5 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Loads dropped DLL
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "windows security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2728
      • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
          4⤵
          • Executes dropped EXE
          PID:2776
        • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
          4⤵
          • Executes dropped EXE
          PID:2760
        • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "windows security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:2320
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\1Sy5G0nUrwbl.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1500
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              6⤵
                PID:1988
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                6⤵
                • Runs ping.exe
                PID:2192
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 1456
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:2184
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2652
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
            4⤵
              PID:1820
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\e6vCdvpWvnng.bat" "
            3⤵
              PID:2464
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                4⤵
                  PID:2268
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  4⤵
                  • Runs ping.exe
                  PID:2288
                • C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe
                  "C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe"
                  4⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:348
                  • C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe
                    "C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe"
                    5⤵
                      PID:1620
                    • C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe
                      "C:\Users\Admin\AppData\Local\Temp\38842bfc2ef9e1a4734a3ac4d4fa0b0d_JaffaCakes118.exe"
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:580

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\1Sy5G0nUrwbl.bat

              Filesize

              217B

              MD5

              78e59a324751fcb3cbdadae0f3b5e06a

              SHA1

              fda3ae5c0eea93d04be04f15124edacb59f938b3

              SHA256

              64b7c79622ae304e9dc7b208bfb1382d31f56c84991c3ba0a910a1d2f3ac859a

              SHA512

              3b3a0fb06af6bb186e168bc0f0b700ee826f3327b36ca19d5fd06db56654cf2cf8a4dc7bce31ad345a80bfc2f11d92d6c3def58071a162e86baa4d43e2b17bbc

            • C:\Users\Admin\AppData\Local\Temp\e6vCdvpWvnng.bat

              Filesize

              243B

              MD5

              751cd8c7f7d716853bcd649e1ebccaee

              SHA1

              a83dbca599c54ccfcad378ce1856ad928a17e56c

              SHA256

              1b58e66eedb02f198a08ed6e60cc75591475269950256610e1dccb47e9b4cd48

              SHA512

              cdd06e92485012e2c8b49eac4b6eaa4c140907ec822e207c7541b4dc2571d99c89f29f4ac77c601272c145d553e9a2978dbba9ec6ff0d2488165070f21b9ea82

            • \Users\Admin\AppData\Roaming\SubDir\windows security.exe

              Filesize

              600KB

              MD5

              38842bfc2ef9e1a4734a3ac4d4fa0b0d

              SHA1

              d7702f8f8b6d8baa46c066948b8278bfe868cff5

              SHA256

              995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824

              SHA512

              067a32950f8800f2ab64d80c6910abf20e0204457abca4156a5a93624c230720b7904fe48ef26ab2ea15958abdb8a53306513c4db74ca69f02de679c5c360346

            • memory/348-73-0x00000000008F0000-0x000000000098C000-memory.dmp

              Filesize

              624KB

            • memory/580-82-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/1676-15-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1676-18-0x0000000074590000-0x0000000074C7E000-memory.dmp

              Filesize

              6.9MB

            • memory/1676-16-0x0000000074590000-0x0000000074C7E000-memory.dmp

              Filesize

              6.9MB

            • memory/1676-13-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1676-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/1676-8-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1676-7-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1676-6-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1676-71-0x0000000074590000-0x0000000074C7E000-memory.dmp

              Filesize

              6.9MB

            • memory/1676-62-0x0000000074590000-0x0000000074C7E000-memory.dmp

              Filesize

              6.9MB

            • memory/1676-11-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1676-5-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/2068-0-0x000000007459E000-0x000000007459F000-memory.dmp

              Filesize

              4KB

            • memory/2068-4-0x00000000002F0000-0x00000000002FA000-memory.dmp

              Filesize

              40KB

            • memory/2068-17-0x0000000074590000-0x0000000074C7E000-memory.dmp

              Filesize

              6.9MB

            • memory/2068-2-0x0000000074590000-0x0000000074C7E000-memory.dmp

              Filesize

              6.9MB

            • memory/2068-1-0x0000000000350000-0x00000000003EC000-memory.dmp

              Filesize

              624KB

            • memory/2720-26-0x0000000000E70000-0x0000000000F0C000-memory.dmp

              Filesize

              624KB

            • memory/2836-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB