Analysis
-
max time kernel
127s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 04:45
Behavioral task
behavioral1
Sample
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe
-
Size
349KB
-
MD5
b6d27d9de9c98e06a834b4a5e3fdc8a3
-
SHA1
32e80bb0a35effca77cb6397de418a94437d446d
-
SHA256
74742ba79b57e06294eb3bfb448a879efa96010e1e9d3b3cdf3a712c5ed124ac
-
SHA512
b71c11bf1108e5997f350bb097c2acc3eb8dbb568d852b9830d17efa4a140d17b3cb835b489103357cf15abd0b7eeceec36c8249908d13b6bf083dec0e3407e2
-
SSDEEP
6144:uK2J10qdSlEc39HGX/dcUoOsKNVownkbX+TTbsEAk0G:uKFplKNVo02+TfsEAk0G
Malware Config
Extracted
quasar
1.3.0.0
111111111
139.129.54.18:4782
QSR_MUTEX_RhXdelp3vz1zkVSxiU
-
encryption_key
DTgqF0OhA9OI0IK5lKb7
-
install_name
QQProtect.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
QQProtect
-
subdirectory
Copyright
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1848-1-0x00000000013C0000-0x000000000141E000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\Copyright\QQProtect.exe family_quasar behavioral1/memory/3068-10-0x0000000000360000-0x00000000003BE000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
Processes:
QQProtect.exepid process 3068 QQProtect.exe -
Loads dropped DLL 1 IoCs
Processes:
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exepid process 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2292 schtasks.exe 2620 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exeQQProtect.exedescription pid process Token: SeDebugPrivilege 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe Token: SeDebugPrivilege 3068 QQProtect.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exeQQProtect.exedescription pid process target process PID 1848 wrote to memory of 2292 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe schtasks.exe PID 1848 wrote to memory of 2292 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe schtasks.exe PID 1848 wrote to memory of 2292 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe schtasks.exe PID 1848 wrote to memory of 2292 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe schtasks.exe PID 1848 wrote to memory of 3068 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe QQProtect.exe PID 1848 wrote to memory of 3068 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe QQProtect.exe PID 1848 wrote to memory of 3068 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe QQProtect.exe PID 1848 wrote to memory of 3068 1848 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe QQProtect.exe PID 3068 wrote to memory of 2620 3068 QQProtect.exe schtasks.exe PID 3068 wrote to memory of 2620 3068 QQProtect.exe schtasks.exe PID 3068 wrote to memory of 2620 3068 QQProtect.exe schtasks.exe PID 3068 wrote to memory of 2620 3068 QQProtect.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "QQProtect" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exe"C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "QQProtect" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\Copyright\QQProtect.exeFilesize
349KB
MD5b6d27d9de9c98e06a834b4a5e3fdc8a3
SHA132e80bb0a35effca77cb6397de418a94437d446d
SHA25674742ba79b57e06294eb3bfb448a879efa96010e1e9d3b3cdf3a712c5ed124ac
SHA512b71c11bf1108e5997f350bb097c2acc3eb8dbb568d852b9830d17efa4a140d17b3cb835b489103357cf15abd0b7eeceec36c8249908d13b6bf083dec0e3407e2
-
memory/1848-0-0x0000000074BFE000-0x0000000074BFF000-memory.dmpFilesize
4KB
-
memory/1848-1-0x00000000013C0000-0x000000000141E000-memory.dmpFilesize
376KB
-
memory/1848-2-0x0000000074BF0000-0x00000000752DE000-memory.dmpFilesize
6.9MB
-
memory/1848-12-0x0000000074BF0000-0x00000000752DE000-memory.dmpFilesize
6.9MB
-
memory/3068-10-0x0000000000360000-0x00000000003BE000-memory.dmpFilesize
376KB
-
memory/3068-11-0x0000000074BF0000-0x00000000752DE000-memory.dmpFilesize
6.9MB
-
memory/3068-13-0x0000000074BF0000-0x00000000752DE000-memory.dmpFilesize
6.9MB
-
memory/3068-14-0x0000000074BF0000-0x00000000752DE000-memory.dmpFilesize
6.9MB