Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-06-2024 05:26

General

  • Target

    017d1ddeb4f16982eda16fe8f07c63e6_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    017d1ddeb4f16982eda16fe8f07c63e6

  • SHA1

    ac0bca32f8eb453aad9df1b9fb0ca6dad9d70556

  • SHA256

    317318d266640fa0575567b71cc5ba18e1cca5d8205e544037e6e730a3795e87

  • SHA512

    d0439cdcea450461ce8f61121b86fada72abd52d13251e47d76949aa9ce370c8bc64169be96719e7010411fe92d8194db9835df1825490da4bc283b1660886bc

  • SSDEEP

    49152:sslxW0qtwxdh9Q7Wm1kX8sp1ua2oUHXN5Wr7Pf:nlwTtWhs1a8KOVHXNgXf

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

RAT

C2

23.105.131.178:7812

Mutex

VNM_MUTEX_It9SqdFDNndEItXfKp

Attributes
  • encryption_key

    txgQXKaATimN7DY8jnPH

  • install_name

    Windows Defender Security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    Microsoft

Signatures

  • Contains code to disable Windows Defender 8 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 7 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017d1ddeb4f16982eda16fe8f07c63e6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\017d1ddeb4f16982eda16fe8f07c63e6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Temp\017d1ddeb4f16982eda16fe8f07c63e6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\017d1ddeb4f16982eda16fe8f07c63e6_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4548
      • C:\Users\Admin\AppData\Local\Temp\AMAZON VALID EMAILS CHECKER BY X-SLAYER.EXE
        "C:\Users\Admin\AppData\Local\Temp\AMAZON VALID EMAILS CHECKER BY X-SLAYER.EXE"
        3⤵
        • Executes dropped EXE
        PID:1544
      • C:\Users\Admin\AppData\Local\Temp\WINDOWS DEFENDER SECURITY.EXE
        "C:\Users\Admin\AppData\Local\Temp\WINDOWS DEFENDER SECURITY.EXE"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Checks computer location settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\WINDOWS DEFENDER SECURITY.EXE" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2136
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3964
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe" /rl HIGHEST /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2128
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4124
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3380
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
            5⤵
              PID:3184
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KOe4fztH5FfQ.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4476
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:3244
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                5⤵
                • Runs ping.exe
                PID:3368
              • C:\Users\Admin\AppData\Local\Temp\WINDOWS DEFENDER SECURITY.EXE
                "C:\Users\Admin\AppData\Local\Temp\WINDOWS DEFENDER SECURITY.EXE"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4124
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4264,i,5229431749694857451,16836185654682871752,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:8
        1⤵
          PID:4788

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WINDOWS DEFENDER SECURITY.EXE.log

          Filesize

          1KB

          MD5

          10eab9c2684febb5327b6976f2047587

          SHA1

          a12ed54146a7f5c4c580416aecb899549712449e

          SHA256

          f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

          SHA512

          7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

        • C:\Users\Admin\AppData\Local\Temp\AMAZON VALID EMAILS CHECKER BY X-SLAYER.EXE

          Filesize

          803KB

          MD5

          305aa19532d3f9b073a00554136f0e98

          SHA1

          e09303e02e1205319979676e73aff57b69ea8c17

          SHA256

          5d7840b21dfc68963642589e4089f762cb4af25653ed66db8ff880efbe8b86c6

          SHA512

          1b078b431a12e869d6aa9c0bf44815934d6c1548ba8f09f37ddccd0988a3bcd2dc40944ddcb53003f1a259c26576f37fa9cec7a8ca1285ddbb459f66e297f83a

        • C:\Users\Admin\AppData\Local\Temp\KOe4fztH5FfQ.bat

          Filesize

          222B

          MD5

          bbb10ceb91723efcb5f9489362d70bd1

          SHA1

          0c62c8aaad20c924fdccc99986082a2446bc633c

          SHA256

          352dc0c0c26223bb3a61321bc622a0209b5db3f4544b05cc60343d33bd99f116

          SHA512

          e48507ec076142a92b0962c8d7e2eaa5caf79b993e8e78cfedd2f99369c4ccb83ac8ed1acf5a7b88f9345ab23670f2757d94ae6163acb1ac0d7429aff56c1148

        • C:\Users\Admin\AppData\Local\Temp\WINDOWS DEFENDER SECURITY.EXE

          Filesize

          535KB

          MD5

          0bd3018c9c566328497be54c7d882159

          SHA1

          8d90c23ee373ab935ba930f25c96374762c4a5a6

          SHA256

          026971c3fba531247627dd9f3f7d51c566d8df28a52332bd3d0eb8ca55d96176

          SHA512

          90cfde84ae14de5151c4950b8f8fe05d108a9716f3e0c104e2793a9c8bbb6a4385fe24a1bd9bc020cd061a128bb258ef44ef8679ac4b0e8a280107b22ed9e8cc

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h3jkqcsu.xue.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1544-42-0x00000177F0560000-0x00000177F0570000-memory.dmp

          Filesize

          64KB

        • memory/1544-40-0x00000177EE440000-0x00000177EE446000-memory.dmp

          Filesize

          24KB

        • memory/1544-39-0x00000177EDFC0000-0x00000177EE092000-memory.dmp

          Filesize

          840KB

        • memory/1544-43-0x00000177F0690000-0x00000177F07EC000-memory.dmp

          Filesize

          1.4MB

        • memory/1544-35-0x00007FFF03383000-0x00007FFF03385000-memory.dmp

          Filesize

          8KB

        • memory/2720-45-0x0000000006570000-0x0000000006582000-memory.dmp

          Filesize

          72KB

        • memory/2720-44-0x0000000005720000-0x0000000005786000-memory.dmp

          Filesize

          408KB

        • memory/2720-41-0x0000000074260000-0x0000000074A10000-memory.dmp

          Filesize

          7.7MB

        • memory/2720-46-0x0000000006AB0000-0x0000000006AEC000-memory.dmp

          Filesize

          240KB

        • memory/2720-36-0x000000007426E000-0x000000007426F000-memory.dmp

          Filesize

          4KB

        • memory/2720-94-0x000000007426E000-0x000000007426F000-memory.dmp

          Filesize

          4KB

        • memory/2720-38-0x0000000000DD0000-0x0000000000E5C000-memory.dmp

          Filesize

          560KB

        • memory/2720-95-0x0000000074260000-0x0000000074A10000-memory.dmp

          Filesize

          7.7MB

        • memory/2720-100-0x0000000074260000-0x0000000074A10000-memory.dmp

          Filesize

          7.7MB

        • memory/3964-69-0x00000000063A0000-0x00000000063AA000-memory.dmp

          Filesize

          40KB

        • memory/4124-53-0x00000000059F0000-0x0000000006018000-memory.dmp

          Filesize

          6.2MB

        • memory/4124-82-0x0000000007B50000-0x0000000007BF3000-memory.dmp

          Filesize

          652KB

        • memory/4124-91-0x0000000007FA0000-0x0000000007FA8000-memory.dmp

          Filesize

          32KB

        • memory/4124-90-0x0000000007FC0000-0x0000000007FDA000-memory.dmp

          Filesize

          104KB

        • memory/4124-89-0x0000000007EC0000-0x0000000007ED4000-memory.dmp

          Filesize

          80KB

        • memory/4124-52-0x0000000005300000-0x0000000005336000-memory.dmp

          Filesize

          216KB

        • memory/4124-88-0x0000000007EB0000-0x0000000007EBE000-memory.dmp

          Filesize

          56KB

        • memory/4124-87-0x0000000007E80000-0x0000000007E91000-memory.dmp

          Filesize

          68KB

        • memory/4124-59-0x0000000006150000-0x0000000006172000-memory.dmp

          Filesize

          136KB

        • memory/4124-64-0x00000000063E0000-0x0000000006446000-memory.dmp

          Filesize

          408KB

        • memory/4124-65-0x00000000064E0000-0x0000000006834000-memory.dmp

          Filesize

          3.3MB

        • memory/4124-66-0x0000000006930000-0x000000000694E000-memory.dmp

          Filesize

          120KB

        • memory/4124-67-0x0000000006960000-0x00000000069AC000-memory.dmp

          Filesize

          304KB

        • memory/4124-86-0x0000000007F00000-0x0000000007F96000-memory.dmp

          Filesize

          600KB

        • memory/4124-71-0x0000000070210000-0x000000007025C000-memory.dmp

          Filesize

          304KB

        • memory/4124-70-0x0000000007910000-0x0000000007942000-memory.dmp

          Filesize

          200KB

        • memory/4124-81-0x0000000006F00000-0x0000000006F1E000-memory.dmp

          Filesize

          120KB

        • memory/4124-85-0x0000000007CF0000-0x0000000007CFA000-memory.dmp

          Filesize

          40KB

        • memory/4124-83-0x00000000082C0000-0x000000000893A000-memory.dmp

          Filesize

          6.5MB

        • memory/4124-84-0x0000000007C80000-0x0000000007C9A000-memory.dmp

          Filesize

          104KB

        • memory/4548-7-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB

        • memory/4548-8-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB

        • memory/4548-9-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB

        • memory/4548-37-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB

        • memory/4548-12-0x0000000000400000-0x0000000000564000-memory.dmp

          Filesize

          1.4MB

        • memory/4972-3-0x0000000005B80000-0x0000000005CB2000-memory.dmp

          Filesize

          1.2MB

        • memory/4972-6-0x0000000005B40000-0x0000000005B4A000-memory.dmp

          Filesize

          40KB

        • memory/4972-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

          Filesize

          4KB

        • memory/4972-5-0x0000000005E50000-0x0000000005EE2000-memory.dmp

          Filesize

          584KB

        • memory/4972-4-0x0000000006260000-0x0000000006804000-memory.dmp

          Filesize

          5.6MB

        • memory/4972-2-0x0000000074D70000-0x0000000075520000-memory.dmp

          Filesize

          7.7MB

        • memory/4972-1-0x0000000000EB0000-0x0000000001150000-memory.dmp

          Filesize

          2.6MB

        • memory/4972-13-0x0000000074D70000-0x0000000075520000-memory.dmp

          Filesize

          7.7MB