Analysis
-
max time kernel
137s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe
-
Size
640KB
-
MD5
e2afad2e4405ec0c5c22398203a3443d
-
SHA1
eb212f7682d5fa24f9580aaeeaee6c3b3318f548
-
SHA256
6fb67950f8de0f87ee4cd34d50d068ee4b5e5418d363a189da0d9949db6be8ed
-
SHA512
30aa913e09d206d7ed08d0d71e97444fdb350dd2f8d8e382c2c4c4b236196b245a4dc6e229d5c7cad5f1ce0bfba1675cd677f82eb7728f59299922008843b5c3
-
SSDEEP
12288:Ke/qyvMV80A9RzEPTWJVBpDyFjbgexPprcLFI0gNoxHsgL7A26:RRMV8P9uPTqmjUexBr8xH1L
Malware Config
Extracted
quasar
2.1.0.0
svhost
myconect.ddns.net:6606
VNM_MUTEX_rHOHbrAQKctPD4d68w
-
encryption_key
rDFwhCyuKMqXO7llDpB2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\test1.exe disable_win_def behavioral1/memory/1732-14-0x00000000003C0000-0x000000000046A000-memory.dmp disable_win_def behavioral1/memory/2640-24-0x0000000000B30000-0x0000000000BDA000-memory.dmp disable_win_def behavioral1/memory/2152-91-0x00000000000E0000-0x000000000018A000-memory.dmp disable_win_def -
Processes:
test1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection test1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" test1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" test1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" test1.exe -
Quasar payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\test1.exe family_quasar behavioral1/memory/1732-14-0x00000000003C0000-0x000000000046A000-memory.dmp family_quasar behavioral1/memory/2640-24-0x0000000000B30000-0x0000000000BDA000-memory.dmp family_quasar behavioral1/memory/2152-91-0x00000000000E0000-0x000000000018A000-memory.dmp family_quasar -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1812 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
test1.exeClient.exetest1.exepid process 1732 test1.exe 2640 Client.exe 2152 test1.exe -
Loads dropped DLL 2 IoCs
Processes:
e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exetest1.exepid process 2292 e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe 1732 test1.exe -
Processes:
test1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features test1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" test1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Client.exechcp.comtest1.exeschtasks.exee2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exeDllHost.exeschtasks.exePING.EXEtest1.exepowershell.execmd.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2724 schtasks.exe 2756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exetest1.exetest1.exepid process 2900 powershell.exe 1732 test1.exe 1732 test1.exe 1732 test1.exe 1732 test1.exe 1732 test1.exe 1732 test1.exe 1732 test1.exe 2152 test1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
test1.exepowershell.exeClient.exetest1.exedescription pid process Token: SeDebugPrivilege 1732 test1.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 2640 Client.exe Token: SeDebugPrivilege 2640 Client.exe Token: SeDebugPrivilege 2152 test1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2112 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 2640 Client.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exetest1.exeClient.execmd.execmd.exedescription pid process target process PID 2292 wrote to memory of 1732 2292 e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe test1.exe PID 2292 wrote to memory of 1732 2292 e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe test1.exe PID 2292 wrote to memory of 1732 2292 e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe test1.exe PID 2292 wrote to memory of 1732 2292 e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe test1.exe PID 1732 wrote to memory of 2724 1732 test1.exe schtasks.exe PID 1732 wrote to memory of 2724 1732 test1.exe schtasks.exe PID 1732 wrote to memory of 2724 1732 test1.exe schtasks.exe PID 1732 wrote to memory of 2724 1732 test1.exe schtasks.exe PID 1732 wrote to memory of 2640 1732 test1.exe Client.exe PID 1732 wrote to memory of 2640 1732 test1.exe Client.exe PID 1732 wrote to memory of 2640 1732 test1.exe Client.exe PID 1732 wrote to memory of 2640 1732 test1.exe Client.exe PID 1732 wrote to memory of 2900 1732 test1.exe powershell.exe PID 1732 wrote to memory of 2900 1732 test1.exe powershell.exe PID 1732 wrote to memory of 2900 1732 test1.exe powershell.exe PID 1732 wrote to memory of 2900 1732 test1.exe powershell.exe PID 2640 wrote to memory of 2756 2640 Client.exe schtasks.exe PID 2640 wrote to memory of 2756 2640 Client.exe schtasks.exe PID 2640 wrote to memory of 2756 2640 Client.exe schtasks.exe PID 2640 wrote to memory of 2756 2640 Client.exe schtasks.exe PID 1732 wrote to memory of 1792 1732 test1.exe cmd.exe PID 1732 wrote to memory of 1792 1732 test1.exe cmd.exe PID 1732 wrote to memory of 1792 1732 test1.exe cmd.exe PID 1732 wrote to memory of 1792 1732 test1.exe cmd.exe PID 1792 wrote to memory of 1812 1792 cmd.exe cmd.exe PID 1792 wrote to memory of 1812 1792 cmd.exe cmd.exe PID 1792 wrote to memory of 1812 1792 cmd.exe cmd.exe PID 1792 wrote to memory of 1812 1792 cmd.exe cmd.exe PID 1732 wrote to memory of 2596 1732 test1.exe cmd.exe PID 1732 wrote to memory of 2596 1732 test1.exe cmd.exe PID 1732 wrote to memory of 2596 1732 test1.exe cmd.exe PID 1732 wrote to memory of 2596 1732 test1.exe cmd.exe PID 2596 wrote to memory of 2952 2596 cmd.exe chcp.com PID 2596 wrote to memory of 2952 2596 cmd.exe chcp.com PID 2596 wrote to memory of 2952 2596 cmd.exe chcp.com PID 2596 wrote to memory of 2952 2596 cmd.exe chcp.com PID 2596 wrote to memory of 304 2596 cmd.exe PING.EXE PID 2596 wrote to memory of 304 2596 cmd.exe PING.EXE PID 2596 wrote to memory of 304 2596 cmd.exe PING.EXE PID 2596 wrote to memory of 304 2596 cmd.exe PING.EXE PID 2596 wrote to memory of 2152 2596 cmd.exe test1.exe PID 2596 wrote to memory of 2152 2596 cmd.exe test1.exe PID 2596 wrote to memory of 2152 2596 cmd.exe test1.exe PID 2596 wrote to memory of 2152 2596 cmd.exe test1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2afad2e4405ec0c5c22398203a3443d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\test1.exe"C:\Users\Admin\AppData\Roaming\test1.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\test1.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2724
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9GF8R1tErA7z.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:304
-
-
C:\Users\Admin\AppData\Roaming\test1.exe"C:\Users\Admin\AppData\Roaming\test1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2112
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD58423f014ec1542cfacaf33de536cbc91
SHA19abd02421ca455ff3de41cf92a6badbd461cfe69
SHA256414b9e0eb140571d33786270a91af3233fe50bbba5fe38f4d83ed91b5154d2dd
SHA51205329148555e557189584ac040bb0597406e28e85f6a009aee5b9a84acaae214e3d00f6c2ea1332f96f53476aac5ac4ddc36384ddc16e7bd81f72d5982276101
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
72KB
MD5277f0e029298e0dffee3f8820726c6e3
SHA1df2cdaa12ccc9e0eb0de1871c9fa12cec9f575a2
SHA256f7ede3780d2e6789dfd5aaf99d8613040e6150f44ab547116817dc2f7ad442a8
SHA512b2fc83d2e4d682007109be8b33aff144af3ad8f6466b911c6f48516fde5530234ed964d12a82e1e10a4a79130ee59fdc2076106d4f7460e036cdd0454da90272
-
Filesize
655KB
MD543e5556cab3ba9cd353b0c6cf1548d75
SHA164cf51c0d612cb6276e59639071406c1d2e86702
SHA256286ea33997e28cad2651bc27c091e45c3502c4c7f69e4f28965bf846cf9528b8
SHA512edde4a5af40e65afbe4e212e356879277f9641e4b8d46950fed33397754fe87ff81a337623e6c5202776e1636cefcd58f0ed94a212e8dd25ba427a017fcb2bdf