Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:28
Behavioral task
behavioral1
Sample
6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe
-
Size
348KB
-
MD5
6e0afb3139f4a822fb8e62492fbff4f4
-
SHA1
8acc07d47261f85b951beae1318e8a06ee5b1e62
-
SHA256
489d79372f4dd063454ee6345567b4cc799262ccbc28ac56ccde8ab8376bdb4f
-
SHA512
6ea362c2c8f7d4a3ac22cde95e2680e102f36e775cc6dadabbd3d71912c7c0e5034426c78c55261b5910512b7a54273edc9b04c872516f001dc2cb03f68f5393
-
SSDEEP
6144:ocNHXf500MoE0y0AsNibhU7Z2eCwKlJ8zVefSuDi:Nd50N0yIWUpCll6VefRDi
Malware Config
Extracted
quasar
1.3.0.0
Monero1
75.139.0.160:9871
108.72.117.71:9871
QSR_MUTEX_SjYNYmwyMIEGFFUXAW
-
encryption_key
lGV9pIlTiS49bFQmGvYu
-
install_name
Quas2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Monero2
-
subdirectory
quasr2
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2700-1-0x0000000000B10000-0x0000000000B6E000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\quasr2\Quas2.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
Quas2.exepid process 1828 Quas2.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ip-api.com -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5068 schtasks.exe 2484 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exeQuas2.exedescription pid process Token: SeDebugPrivilege 2700 6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe Token: SeDebugPrivilege 1828 Quas2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exeQuas2.exedescription pid process target process PID 2700 wrote to memory of 5068 2700 6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe schtasks.exe PID 2700 wrote to memory of 5068 2700 6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe schtasks.exe PID 2700 wrote to memory of 5068 2700 6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe schtasks.exe PID 2700 wrote to memory of 1828 2700 6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe Quas2.exe PID 2700 wrote to memory of 1828 2700 6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe Quas2.exe PID 2700 wrote to memory of 1828 2700 6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe Quas2.exe PID 1828 wrote to memory of 2484 1828 Quas2.exe schtasks.exe PID 1828 wrote to memory of 2484 1828 Quas2.exe schtasks.exe PID 1828 wrote to memory of 2484 1828 Quas2.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Monero2" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\6e0afb3139f4a822fb8e62492fbff4f4_JaffaCakes118.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:5068 -
C:\Users\Admin\AppData\Roaming\quasr2\Quas2.exe"C:\Users\Admin\AppData\Roaming\quasr2\Quas2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Monero2" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\quasr2\Quas2.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD56e0afb3139f4a822fb8e62492fbff4f4
SHA18acc07d47261f85b951beae1318e8a06ee5b1e62
SHA256489d79372f4dd063454ee6345567b4cc799262ccbc28ac56ccde8ab8376bdb4f
SHA5126ea362c2c8f7d4a3ac22cde95e2680e102f36e775cc6dadabbd3d71912c7c0e5034426c78c55261b5910512b7a54273edc9b04c872516f001dc2cb03f68f5393