Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
533a8b7d2d523e95e31f517ea0e432de
-
SHA1
64e003d9c733196f1c1569ee40c64983cc6e4127
-
SHA256
59b2725f7466da2b7426c5d2b64af386c128e313738a0cd5a838a5ec3ca90b5c
-
SHA512
b777d95be33e9b9cd5e0f4e5d9c494b83be0f835697bf9b358c7cc93acf6f2ef35f2ac502b9f96030c0262a0c5289d072b0920cd9ea46eea0fa1b4cc59136c4f
-
SSDEEP
49152:NUF0bDj03kJVsDZj3dE1juUo5XipVmaiDQ2EX8q8bgZvakhJGFLBz8LS:NUFUjmmVsDhNYj/VpVzh2I4S0FLBz8LS
Malware Config
Extracted
quasar
2.1.0.0
RAT
23.105.131.178:7812
VNM_MUTEX_gdy9bWxR0te3WgTRnI
-
encryption_key
MDXzdQumRqZGIeya7nG9
-
install_name
Windows Defender Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
Microsoft
Signatures
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/files/0x000700000001211b-5.dat disable_win_def behavioral1/memory/2176-19-0x0000000000F00000-0x0000000000F8C000-memory.dmp disable_win_def behavioral1/memory/652-34-0x0000000000200000-0x000000000028C000-memory.dmp disable_win_def behavioral1/memory/980-102-0x0000000000F50000-0x0000000000FDC000-memory.dmp disable_win_def -
Processes:
Windows Defender Security.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Windows Defender Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Windows Defender Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Windows Defender Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Windows Defender Security.exe -
Quasar payload 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x000700000001211b-5.dat family_quasar behavioral1/memory/2176-19-0x0000000000F00000-0x0000000000F8C000-memory.dmp family_quasar behavioral1/memory/652-34-0x0000000000200000-0x000000000028C000-memory.dmp family_quasar behavioral1/memory/980-102-0x0000000000F50000-0x0000000000FDC000-memory.dmp family_quasar -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2428 cmd.exe -
Executes dropped EXE 4 IoCs
Processes:
Windows Defender Security.exeAmazon valid emails by Scorpio.exeWindows Defender Security.exeWindows Defender Security.exepid Process 2176 Windows Defender Security.exe 2908 Amazon valid emails by Scorpio.exe 652 Windows Defender Security.exe 980 Windows Defender Security.exe -
Loads dropped DLL 8 IoCs
Processes:
533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exeWerFault.exeWindows Defender Security.exepid Process 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 2008 WerFault.exe 2008 WerFault.exe 2008 WerFault.exe 2008 WerFault.exe 2008 WerFault.exe 2176 Windows Defender Security.exe -
Processes:
Windows Defender Security.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features Windows Defender Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Defender Security.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2008 2908 WerFault.exe 31 -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 1972 schtasks.exe 1320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exeWindows Defender Security.exeWindows Defender Security.exepid Process 2684 powershell.exe 2176 Windows Defender Security.exe 2176 Windows Defender Security.exe 2176 Windows Defender Security.exe 2176 Windows Defender Security.exe 2176 Windows Defender Security.exe 2176 Windows Defender Security.exe 2176 Windows Defender Security.exe 980 Windows Defender Security.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Amazon valid emails by Scorpio.exeWindows Defender Security.exepowershell.exeWindows Defender Security.exeWindows Defender Security.exedescription pid Process Token: SeDebugPrivilege 2908 Amazon valid emails by Scorpio.exe Token: SeDebugPrivilege 2176 Windows Defender Security.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 652 Windows Defender Security.exe Token: SeDebugPrivilege 652 Windows Defender Security.exe Token: SeDebugPrivilege 980 Windows Defender Security.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Defender Security.exepid Process 652 Windows Defender Security.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exeAmazon valid emails by Scorpio.exeWindows Defender Security.exeWindows Defender Security.execmd.execmd.exedescription pid Process procid_target PID 2824 wrote to memory of 2176 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2176 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2176 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2176 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2908 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2908 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2908 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2908 2824 533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe 31 PID 2908 wrote to memory of 2008 2908 Amazon valid emails by Scorpio.exe 32 PID 2908 wrote to memory of 2008 2908 Amazon valid emails by Scorpio.exe 32 PID 2908 wrote to memory of 2008 2908 Amazon valid emails by Scorpio.exe 32 PID 2908 wrote to memory of 2008 2908 Amazon valid emails by Scorpio.exe 32 PID 2176 wrote to memory of 1320 2176 Windows Defender Security.exe 34 PID 2176 wrote to memory of 1320 2176 Windows Defender Security.exe 34 PID 2176 wrote to memory of 1320 2176 Windows Defender Security.exe 34 PID 2176 wrote to memory of 1320 2176 Windows Defender Security.exe 34 PID 2176 wrote to memory of 652 2176 Windows Defender Security.exe 36 PID 2176 wrote to memory of 652 2176 Windows Defender Security.exe 36 PID 2176 wrote to memory of 652 2176 Windows Defender Security.exe 36 PID 2176 wrote to memory of 652 2176 Windows Defender Security.exe 36 PID 2176 wrote to memory of 2684 2176 Windows Defender Security.exe 37 PID 2176 wrote to memory of 2684 2176 Windows Defender Security.exe 37 PID 2176 wrote to memory of 2684 2176 Windows Defender Security.exe 37 PID 2176 wrote to memory of 2684 2176 Windows Defender Security.exe 37 PID 652 wrote to memory of 1972 652 Windows Defender Security.exe 39 PID 652 wrote to memory of 1972 652 Windows Defender Security.exe 39 PID 652 wrote to memory of 1972 652 Windows Defender Security.exe 39 PID 652 wrote to memory of 1972 652 Windows Defender Security.exe 39 PID 2176 wrote to memory of 2768 2176 Windows Defender Security.exe 41 PID 2176 wrote to memory of 2768 2176 Windows Defender Security.exe 41 PID 2176 wrote to memory of 2768 2176 Windows Defender Security.exe 41 PID 2176 wrote to memory of 2768 2176 Windows Defender Security.exe 41 PID 2768 wrote to memory of 2428 2768 cmd.exe 43 PID 2768 wrote to memory of 2428 2768 cmd.exe 43 PID 2768 wrote to memory of 2428 2768 cmd.exe 43 PID 2768 wrote to memory of 2428 2768 cmd.exe 43 PID 2176 wrote to memory of 1716 2176 Windows Defender Security.exe 45 PID 2176 wrote to memory of 1716 2176 Windows Defender Security.exe 45 PID 2176 wrote to memory of 1716 2176 Windows Defender Security.exe 45 PID 2176 wrote to memory of 1716 2176 Windows Defender Security.exe 45 PID 1716 wrote to memory of 2456 1716 cmd.exe 47 PID 1716 wrote to memory of 2456 1716 cmd.exe 47 PID 1716 wrote to memory of 2456 1716 cmd.exe 47 PID 1716 wrote to memory of 2456 1716 cmd.exe 47 PID 1716 wrote to memory of 2452 1716 cmd.exe 48 PID 1716 wrote to memory of 2452 1716 cmd.exe 48 PID 1716 wrote to memory of 2452 1716 cmd.exe 48 PID 1716 wrote to memory of 2452 1716 cmd.exe 48 PID 1716 wrote to memory of 980 1716 cmd.exe 49 PID 1716 wrote to memory of 980 1716 cmd.exe 49 PID 1716 wrote to memory of 980 1716 cmd.exe 49 PID 1716 wrote to memory of 980 1716 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\533a8b7d2d523e95e31f517ea0e432de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1320
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1972
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- Deletes itself
PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lFLalSjQGQEJ.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:2456
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:2452
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
-
C:\Users\Admin\AppData\Roaming\Amazon valid emails by Scorpio.exe"C:\Users\Admin\AppData\Roaming\Amazon valid emails by Scorpio.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 232283⤵
- Loads dropped DLL
- Program crash
PID:2008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
219B
MD5f3d8193a0f1f4172a174d51235e298ac
SHA1cc747b43daf45ba1bd9b1852deb8e6dafd042f6e
SHA256593d678b1603ab53be25b55d5fb1eaf7684e24fd77a548c4db78ce0d228341fc
SHA5126ec236aa654b38aadd49e210e4da270d5f4af6c91aef1c64b208c5dddf13acafbcfa186f1139c3990a48bd29043c69292ab8b3138d2a4f05e077954949d63524
-
Filesize
2.8MB
MD5555a824b8efc10e007b77675161fbfb8
SHA1b4cf844d2bdd4580aa469341e8613ff6a67d2111
SHA256e458a300574507d1bc999871b5a679494d69eef97c2fcff42715e3148d57646e
SHA512b4fb2092fb1cf6ee94700e29336b0c109f4f2f8a8fcd53e56b136ff62d124d342024496281accaede0b84a5e46e2f7350f3f31b4a1e2d2ffd02436f61b78be8d
-
Filesize
535KB
MD56f3b107a20b18244efb6473bae2544b1
SHA1dc02ec107547c515bffeadcd87e6308c3bdfd390
SHA2562b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0
SHA512318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c