Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 04:45
Behavioral task
behavioral1
Sample
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe
-
Size
349KB
-
MD5
b6d27d9de9c98e06a834b4a5e3fdc8a3
-
SHA1
32e80bb0a35effca77cb6397de418a94437d446d
-
SHA256
74742ba79b57e06294eb3bfb448a879efa96010e1e9d3b3cdf3a712c5ed124ac
-
SHA512
b71c11bf1108e5997f350bb097c2acc3eb8dbb568d852b9830d17efa4a140d17b3cb835b489103357cf15abd0b7eeceec36c8249908d13b6bf083dec0e3407e2
-
SSDEEP
6144:uK2J10qdSlEc39HGX/dcUoOsKNVownkbX+TTbsEAk0G:uKFplKNVo02+TfsEAk0G
Malware Config
Extracted
quasar
1.3.0.0
111111111
139.129.54.18:4782
QSR_MUTEX_RhXdelp3vz1zkVSxiU
-
encryption_key
DTgqF0OhA9OI0IK5lKb7
-
install_name
QQProtect.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
QQProtect
-
subdirectory
Copyright
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/216-1-0x0000000000950000-0x00000000009AE000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
QQProtect.exepid process 4960 QQProtect.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 8 api.ipify.org -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4836 schtasks.exe 4544 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exeQQProtect.exedescription pid process Token: SeDebugPrivilege 216 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe Token: SeDebugPrivilege 4960 QQProtect.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exeQQProtect.exedescription pid process target process PID 216 wrote to memory of 4836 216 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe schtasks.exe PID 216 wrote to memory of 4836 216 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe schtasks.exe PID 216 wrote to memory of 4836 216 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe schtasks.exe PID 216 wrote to memory of 4960 216 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe QQProtect.exe PID 216 wrote to memory of 4960 216 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe QQProtect.exe PID 216 wrote to memory of 4960 216 b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe QQProtect.exe PID 4960 wrote to memory of 4544 4960 QQProtect.exe schtasks.exe PID 4960 wrote to memory of 4544 4960 QQProtect.exe schtasks.exe PID 4960 wrote to memory of 4544 4960 QQProtect.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "QQProtect" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\b6d27d9de9c98e06a834b4a5e3fdc8a3_JaffaCakes118.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exe"C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "QQProtect" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Copyright\QQProtect.exeFilesize
349KB
MD5b6d27d9de9c98e06a834b4a5e3fdc8a3
SHA132e80bb0a35effca77cb6397de418a94437d446d
SHA25674742ba79b57e06294eb3bfb448a879efa96010e1e9d3b3cdf3a712c5ed124ac
SHA512b71c11bf1108e5997f350bb097c2acc3eb8dbb568d852b9830d17efa4a140d17b3cb835b489103357cf15abd0b7eeceec36c8249908d13b6bf083dec0e3407e2
-
memory/216-3-0x00000000053E0000-0x0000000005472000-memory.dmpFilesize
584KB
-
memory/216-8-0x0000000075450000-0x0000000075C00000-memory.dmpFilesize
7.7MB
-
memory/216-0-0x000000007545E000-0x000000007545F000-memory.dmpFilesize
4KB
-
memory/216-4-0x0000000075450000-0x0000000075C00000-memory.dmpFilesize
7.7MB
-
memory/216-5-0x00000000054B0000-0x0000000005516000-memory.dmpFilesize
408KB
-
memory/216-6-0x00000000060A0000-0x00000000060B2000-memory.dmpFilesize
72KB
-
memory/216-7-0x000000007545E000-0x000000007545F000-memory.dmpFilesize
4KB
-
memory/216-2-0x00000000058F0000-0x0000000005E94000-memory.dmpFilesize
5.6MB
-
memory/216-1-0x0000000000950000-0x00000000009AE000-memory.dmpFilesize
376KB
-
memory/216-15-0x0000000075450000-0x0000000075C00000-memory.dmpFilesize
7.7MB
-
memory/4960-16-0x0000000075450000-0x0000000075C00000-memory.dmpFilesize
7.7MB
-
memory/4960-17-0x0000000075450000-0x0000000075C00000-memory.dmpFilesize
7.7MB
-
memory/4960-18-0x0000000075450000-0x0000000075C00000-memory.dmpFilesize
7.7MB
-
memory/4960-19-0x0000000005E40000-0x0000000005E4A000-memory.dmpFilesize
40KB