Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 03:46

General

  • Target

    c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe

  • Size

    606KB

  • MD5

    c23863e0d7186334ca69903c6653ae06

  • SHA1

    6040256f4dabd5ee5dee6560e04c56f699532db6

  • SHA256

    4e07acab1178209379b2f3926e63da1a3002c9640667907db610216bd6e02e72

  • SHA512

    b9a7ffaa9a01a488efd29a9f9162c95a8c50f25d2183679f4783ce900319d81f4d375518667959b89bf8df002a869736a2c47bccae3b8ec5844f8f31c2fa7759

  • SSDEEP

    12288:HDNN+IaAFB0OLrdd5xSx8G3cK6TsrId6dd4WCWd9nNxtSR9UcN+Pjv:HDr+FqVvL5x4RcKYd83CWd9+UPv

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

hacked

C2

23.105.131.178:7812

Mutex

VNM_MUTEX_cFzA15c8rYLW8gVTCh

Attributes
  • encryption_key

    VGvtyILUmmcgl2gY0sSm

  • install_name

    Windows Security Health Service.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Checks computer location settings
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe" /rl HIGHEST /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:920
      • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4180
        • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe" /rl HIGHEST /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3964
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2956
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1720
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\k1Fy3is686ys.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1224
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:936
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3564
        • C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3288
          • C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c23863e0d7186334ca69903c6653ae06_JaffaCakes118.exe.log

    Filesize

    507B

    MD5

    76ffb2f33cb32ade8fc862a67599e9d8

    SHA1

    920cc4ab75b36d2f9f6e979b74db568973c49130

    SHA256

    f1a3724670e3379318ec9c73f6f39058cab0ab013ba3cd90c047c3d701362310

    SHA512

    f33502c2e1bb30c05359bfc6819ca934642a1e01874e3060349127d792694d56ad22fccd6c9477b8ee50d66db35785779324273f509576b48b7f85577e001b4e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5bp4zjwv.jcs.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\k1Fy3is686ys.bat

    Filesize

    243B

    MD5

    8e9089496b14bd44d7d47cc6770e19c0

    SHA1

    4d0348c00b5da6d359f52e1cf18c4309b483774a

    SHA256

    7ff346a5015e7bcf39854676169c84cfeb79ccf0a33d724154654380658b8a29

    SHA512

    3389618500e0242e45e15a97a9ae20c213bf0ae6e0fce53f1d84cbcae57a40bf634c77659f9bbe9b260ca68b8eaaa726d543bbe18d328166fe25deae17561ca9

  • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe

    Filesize

    606KB

    MD5

    c23863e0d7186334ca69903c6653ae06

    SHA1

    6040256f4dabd5ee5dee6560e04c56f699532db6

    SHA256

    4e07acab1178209379b2f3926e63da1a3002c9640667907db610216bd6e02e72

    SHA512

    b9a7ffaa9a01a488efd29a9f9162c95a8c50f25d2183679f4783ce900319d81f4d375518667959b89bf8df002a869736a2c47bccae3b8ec5844f8f31c2fa7759

  • memory/2232-44-0x0000000006980000-0x000000000698A000-memory.dmp

    Filesize

    40KB

  • memory/2956-58-0x0000000008150000-0x00000000087CA000-memory.dmp

    Filesize

    6.5MB

  • memory/2956-61-0x0000000007D80000-0x0000000007E16000-memory.dmp

    Filesize

    600KB

  • memory/2956-66-0x0000000007E20000-0x0000000007E28000-memory.dmp

    Filesize

    32KB

  • memory/2956-65-0x0000000007E40000-0x0000000007E5A000-memory.dmp

    Filesize

    104KB

  • memory/2956-64-0x0000000007D40000-0x0000000007D54000-memory.dmp

    Filesize

    80KB

  • memory/2956-63-0x0000000007D30000-0x0000000007D3E000-memory.dmp

    Filesize

    56KB

  • memory/2956-62-0x0000000007D00000-0x0000000007D11000-memory.dmp

    Filesize

    68KB

  • memory/2956-60-0x0000000007B70000-0x0000000007B7A000-memory.dmp

    Filesize

    40KB

  • memory/2956-59-0x0000000007B00000-0x0000000007B1A000-memory.dmp

    Filesize

    104KB

  • memory/2956-57-0x0000000007A20000-0x0000000007AC3000-memory.dmp

    Filesize

    652KB

  • memory/2956-56-0x0000000006DD0000-0x0000000006DEE000-memory.dmp

    Filesize

    120KB

  • memory/2956-22-0x0000000005210000-0x0000000005246000-memory.dmp

    Filesize

    216KB

  • memory/2956-23-0x0000000005910000-0x0000000005F38000-memory.dmp

    Filesize

    6.2MB

  • memory/2956-46-0x0000000070380000-0x00000000703CC000-memory.dmp

    Filesize

    304KB

  • memory/2956-45-0x0000000006D90000-0x0000000006DC2000-memory.dmp

    Filesize

    200KB

  • memory/2956-30-0x00000000060E0000-0x0000000006146000-memory.dmp

    Filesize

    408KB

  • memory/2956-29-0x0000000006040000-0x0000000006062000-memory.dmp

    Filesize

    136KB

  • memory/2956-40-0x0000000006230000-0x0000000006584000-memory.dmp

    Filesize

    3.3MB

  • memory/2956-41-0x00000000067D0000-0x00000000067EE000-memory.dmp

    Filesize

    120KB

  • memory/2956-42-0x0000000006810000-0x000000000685C000-memory.dmp

    Filesize

    304KB

  • memory/3684-12-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/3684-74-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/3684-70-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/3684-11-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/3684-15-0x0000000006DC0000-0x0000000006DFC000-memory.dmp

    Filesize

    240KB

  • memory/3684-14-0x0000000006740000-0x0000000006752000-memory.dmp

    Filesize

    72KB

  • memory/3684-7-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3684-13-0x00000000059C0000-0x0000000005A26000-memory.dmp

    Filesize

    408KB

  • memory/4180-28-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/4180-21-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/4512-4-0x00000000055A0000-0x000000000563C000-memory.dmp

    Filesize

    624KB

  • memory/4512-0-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

    Filesize

    4KB

  • memory/4512-10-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/4512-6-0x0000000005400000-0x000000000540A000-memory.dmp

    Filesize

    40KB

  • memory/4512-69-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/4512-3-0x0000000005500000-0x0000000005592000-memory.dmp

    Filesize

    584KB

  • memory/4512-2-0x0000000005A10000-0x0000000005FB4000-memory.dmp

    Filesize

    5.6MB

  • memory/4512-1-0x0000000000A10000-0x0000000000AAE000-memory.dmp

    Filesize

    632KB