Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
48578ca46a647e621583b8b3da2bbbc4
-
SHA1
d18da5d905ddc8977a63019df1aa32032c94a946
-
SHA256
2261f624e99b92e00913fd0fc189ae96bb115b3ae5b393e0170066f032b12af1
-
SHA512
55da81e0b1002f6678d64989939836606c40da7b65c43be12de41e0b5a365ed73d9b97aa41f94f9deea5d813707353630b7c70740f523af5aa576dd80bdde0ec
-
SSDEEP
24576:X53uhF8ZcjXB476PaZMr5U3aDAWaPUPTRNTwX6KR8+:X5+hFxPaZSCOtNkq8
Malware Config
Extracted
quasar
1.4.0.0
Office
5.45.65.1:5552
yeGmQfVnPgbImyPaxF
-
encryption_key
983PIud97BRSEjju8fCD
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3196-27-0x00000000127A0000-0x00000000127EE000-memory.dmp family_quasar -
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
Processes:
certutil.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7\Name = "szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL" certutil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe -
Drops startup file 1 IoCs
Processes:
csrss.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aes.url csrss.com -
Executes dropped EXE 3 IoCs
Processes:
csrss.comcsrss.comRegAsm.exepid process 4260 csrss.com 3248 csrss.com 3196 RegAsm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 41 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
csrss.comdescription pid process target process PID 3248 set thread context of 3196 3248 csrss.com RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 3196 RegAsm.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
csrss.comcsrss.compid process 4260 csrss.com 4260 csrss.com 4260 csrss.com 3248 csrss.com 3248 csrss.com 3248 csrss.com -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
csrss.comcsrss.compid process 4260 csrss.com 4260 csrss.com 4260 csrss.com 3248 csrss.com 3248 csrss.com 3248 csrss.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.execmd.execmd.execsrss.comcsrss.comdescription pid process target process PID 1112 wrote to memory of 4664 1112 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 1112 wrote to memory of 4664 1112 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 1112 wrote to memory of 4664 1112 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 1112 wrote to memory of 3412 1112 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 1112 wrote to memory of 3412 1112 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 1112 wrote to memory of 3412 1112 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 3412 wrote to memory of 872 3412 cmd.exe cmd.exe PID 3412 wrote to memory of 872 3412 cmd.exe cmd.exe PID 3412 wrote to memory of 872 3412 cmd.exe cmd.exe PID 872 wrote to memory of 3664 872 cmd.exe PING.EXE PID 872 wrote to memory of 3664 872 cmd.exe PING.EXE PID 872 wrote to memory of 3664 872 cmd.exe PING.EXE PID 872 wrote to memory of 2460 872 cmd.exe certutil.exe PID 872 wrote to memory of 2460 872 cmd.exe certutil.exe PID 872 wrote to memory of 2460 872 cmd.exe certutil.exe PID 872 wrote to memory of 4260 872 cmd.exe csrss.com PID 872 wrote to memory of 4260 872 cmd.exe csrss.com PID 872 wrote to memory of 4260 872 cmd.exe csrss.com PID 872 wrote to memory of 2276 872 cmd.exe PING.EXE PID 872 wrote to memory of 2276 872 cmd.exe PING.EXE PID 872 wrote to memory of 2276 872 cmd.exe PING.EXE PID 4260 wrote to memory of 3248 4260 csrss.com csrss.com PID 4260 wrote to memory of 3248 4260 csrss.com csrss.com PID 4260 wrote to memory of 3248 4260 csrss.com csrss.com PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe PID 3248 wrote to memory of 3196 3248 csrss.com RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo JzHWSBvTS2⤵PID:4664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < oNuxTjCXjWnYpM.com2⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\PING.EXEping -n 1 SrHBN.SqZJ4⤵
- Runs ping.exe
PID:3664 -
C:\Windows\SysWOW64\certutil.execertutil -decode Lhe.com y4⤵
- Manipulates Digital Signatures
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comcsrss.com y4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com y5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3196 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD5dab8f26db6e8d76655d96b463513ce6a
SHA1ea9c3631f94233c06750776cd9bd18e27fbd8677
SHA256549d70cf61a50e8970e274bf7e76f4c9fab1e185189a8ad074e2a5bdea39005b
SHA512e406093eb802a5edbdc0e5f0a849d7f58f10dded413db9b6e0a4788125ba73c5b90f5d42a5d98ac68ba2e1fc01879c1403f32cfb3d8e5c26231c58e9751c2093
-
Filesize
288KB
MD550e71d12a6308a43ecafdff7c0c288ed
SHA1ace1d17c0ffacfa236090c947dc641973edb52cf
SHA2568c518b693e8030f1889578ccf7eaf3387f00ab0d80f08dcd2ce4c7e709cd74a1
SHA512e9c3cb2cb331ee12baa8efeb80c9d7a24a1b2c350ef1160d5b09c6481a895850e0eb8802692f1ba4a59b3b192354267cd6f0205c7babaf5db089ca3f4408a542
-
Filesize
1.3MB
MD552eaf780e2565257d38cb1b928fc7bd7
SHA1d7f7b5180966241b1408d69cb75913b82f9975cc
SHA25641de5f343229c79727df473de3b8e2fd8cdfcf495df5dbf039930c789f4aa473
SHA51265a85f84ab0bc6cb5ad593aa7a84472b0f0bb717097daece9fb3845fc87f01f9c0eb9f03ee8f08477c5b2dbb35ce27a376fdc52e1c5f9d3f391bbf9116645459
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
2KB
MD57e79b5745337937bd60e266c1f045229
SHA1f165e11b04bc713ee702c6052b430af2157d74ec
SHA256412bed46d2ea8b3aa867940e3feae8889ca0669cd03097f7f83a39823d9a9f3c
SHA51266aa34a36e6f370018ebf00e4bd948fa19cad1f2fef0a6af6984d8da0ed270cc09b8f1fe3fdb06a7caf6b0302855b508cf35b45c55141eb3c8a7f739b3bd1ab0
-
Filesize
934KB
MD56598c41a263fcf26913b8e26711c5bc0
SHA11505e9b28252c11b99016fb86ac89eb4bb99e382
SHA2562d4521be86113f3f235149feb339401106524c644a09faed37a1e7bc17cac9c1
SHA512289d6e7ccfacefdad592faa263980adad656e90368475392b1c9b529104a0d2f74ad875b4913210f000ac3edc77c9701f24b0f23bea9b80376645c8e4d272346