Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe
-
Size
6.3MB
-
MD5
4c2035a0494f1e280a9383677f2501fd
-
SHA1
ce190f82c9bdf2652906cafba1a6727e276fd540
-
SHA256
036ccf870c0c626dfab5ff245db67b961d6669af26c3694992b56271a4e979ea
-
SHA512
39206b5b9c00ce04bd1e710f0af7f76f4c522d019f55f7c32c62f9973ec12123fd7dd03897e6de3ed925519dcd263f4981ed7d34ee01304642440fbe2a7e0108
-
SSDEEP
98304:awAwD+xPQPHGGHtWUolKiTQSLQ+NIv9xEDginRBnyecCkyzyNjk:awBAPoHtBoFTQSLQ9VxyyecCLz7
Malware Config
Extracted
quasar
1.3.0.0
SyScmd
91.211.251.108:4782
QSR_MUTEX_qwefagr3235weasfefwwef
-
encryption_key
nWKoI3fOkpyNHoDWEE4y
-
install_name
Update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
syswow
-
subdirectory
Microsoft\Windows\Update
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-89-0x0000000000400000-0x0000000000754000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exepid process 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exedescription pid process Token: 33 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe Token: 33 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe Token: 33 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe Token: SeDebugPrivilege 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exepid process 1736 4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1736