Analysis
-
max time kernel
127s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 23:00
Behavioral task
behavioral1
Sample
43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe
-
Size
349KB
-
MD5
43738a30c4074ca0bef77f528fb75fb1
-
SHA1
4197ff900d723691b0b33a924b6b34ad4dc15f33
-
SHA256
212755a6fea93a698fcc12d08bdb6531c113377e8ddeef0c3185e54f3d2576ac
-
SHA512
86d38ae3a245c155dfaef3a0928923bbccb338daae365b896c672aa98634376bfb113bb45c1bca68f361fc9cce964e1c12ab9971319779ba6f88c84370c2b259
-
SSDEEP
6144:9K2J10qdSlEc39HG0qwmaS23MF+zK5rqt5YOqhLbyfdAVo2Vdd0d:9KFjq7c3FzK5rqcOYyKVoWdd0d
Malware Config
Extracted
quasar
1.3.0.0
Office04
162.206.16.208:4782
QSR_MUTEX_mnskLlemHhwg70HDrH
-
encryption_key
mvXuP4zPWoLOIqtuspGa
-
install_name
bgfd.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Reg Start
-
subdirectory
9807t43nfidyg
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2876-1-0x0000000000090000-0x00000000000EE000-memory.dmp family_quasar behavioral1/files/0x0036000000013a3a-5.dat family_quasar behavioral1/memory/2664-11-0x00000000009F0000-0x0000000000A4E000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2664 bgfd.exe -
Loads dropped DLL 1 IoCs
pid Process 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe 2512 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe Token: SeDebugPrivilege 2664 bgfd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2664 bgfd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2672 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 29 PID 2876 wrote to memory of 2672 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 29 PID 2876 wrote to memory of 2672 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 29 PID 2876 wrote to memory of 2672 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 29 PID 2876 wrote to memory of 2664 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 31 PID 2876 wrote to memory of 2664 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 31 PID 2876 wrote to memory of 2664 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 31 PID 2876 wrote to memory of 2664 2876 43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2512 2664 bgfd.exe 32 PID 2664 wrote to memory of 2512 2664 bgfd.exe 32 PID 2664 wrote to memory of 2512 2664 bgfd.exe 32 PID 2664 wrote to memory of 2512 2664 bgfd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Reg Start" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\43738a30c4074ca0bef77f528fb75fb1_JaffaCakes118.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\9807t43nfidyg\bgfd.exe"C:\Users\Admin\AppData\Roaming\9807t43nfidyg\bgfd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Reg Start" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\9807t43nfidyg\bgfd.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD543738a30c4074ca0bef77f528fb75fb1
SHA14197ff900d723691b0b33a924b6b34ad4dc15f33
SHA256212755a6fea93a698fcc12d08bdb6531c113377e8ddeef0c3185e54f3d2576ac
SHA51286d38ae3a245c155dfaef3a0928923bbccb338daae365b896c672aa98634376bfb113bb45c1bca68f361fc9cce964e1c12ab9971319779ba6f88c84370c2b259