Analysis
-
max time kernel
129s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe
-
Size
590KB
-
MD5
f7d70adb404cf63562d6541fce16ee94
-
SHA1
7c855ae562c54c6747c682f9403ff902308deeb1
-
SHA256
e14fe9800b600ce61b06794233aa47d6fbbc20d18dbb1e531c5deaac995bbca8
-
SHA512
aed0a69aa45018197f04eec259ab4954f0ecd6f0e309a745346282cc46efd4e6567f920a3cfa39326082abff40de6ad932150ae5f6207e1a580d87343410d519
-
SSDEEP
6144:kU9/iRCAm9wyitWVSIyIXQR3YQJrjYPUotecWo7vMyYp5lQj64cmX3Hrv9Otawza:i3ynm3RsPj7WYUxp+TvotLzAFLBz8LS
Malware Config
Extracted
quasar
2.1.0.0
RAT
23.105.131.178:7812
VNM_MUTEX_gdy9bWxR0te3WgTRnI
-
encryption_key
MDXzdQumRqZGIeya7nG9
-
install_name
Windows Defender Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
Microsoft
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x00090000000233e4-7.dat disable_win_def behavioral2/memory/3888-17-0x00000000009C0000-0x0000000000A4C000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Windows Defender Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Windows Defender Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Windows Defender Security.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Windows Defender Security.exe -
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x00090000000233e4-7.dat family_quasar behavioral2/memory/3888-17-0x00000000009C0000-0x0000000000A4C000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Windows Defender Security.exe -
Executes dropped EXE 3 IoCs
pid Process 3888 Windows Defender Security.exe 1520 Windows Defender Security.exe 2316 Windows Defender Security.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Windows Defender Security.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Windows Defender Security.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Defender Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Defender Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Defender Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2708 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2708 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3728 schtasks.exe 3632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3504 powershell.exe 3504 powershell.exe 3888 Windows Defender Security.exe 3888 Windows Defender Security.exe 3888 Windows Defender Security.exe 3888 Windows Defender Security.exe 3888 Windows Defender Security.exe 3888 Windows Defender Security.exe 3888 Windows Defender Security.exe 2316 Windows Defender Security.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3888 Windows Defender Security.exe Token: SeDebugPrivilege 3504 powershell.exe Token: SeDebugPrivilege 1520 Windows Defender Security.exe Token: SeDebugPrivilege 1520 Windows Defender Security.exe Token: SeDebugPrivilege 2316 Windows Defender Security.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1520 Windows Defender Security.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 920 wrote to memory of 3888 920 f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe 83 PID 920 wrote to memory of 3888 920 f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe 83 PID 920 wrote to memory of 3888 920 f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe 83 PID 3888 wrote to memory of 3728 3888 Windows Defender Security.exe 85 PID 3888 wrote to memory of 3728 3888 Windows Defender Security.exe 85 PID 3888 wrote to memory of 3728 3888 Windows Defender Security.exe 85 PID 3888 wrote to memory of 1520 3888 Windows Defender Security.exe 87 PID 3888 wrote to memory of 1520 3888 Windows Defender Security.exe 87 PID 3888 wrote to memory of 1520 3888 Windows Defender Security.exe 87 PID 3888 wrote to memory of 3504 3888 Windows Defender Security.exe 88 PID 3888 wrote to memory of 3504 3888 Windows Defender Security.exe 88 PID 3888 wrote to memory of 3504 3888 Windows Defender Security.exe 88 PID 1520 wrote to memory of 3632 1520 Windows Defender Security.exe 90 PID 1520 wrote to memory of 3632 1520 Windows Defender Security.exe 90 PID 1520 wrote to memory of 3632 1520 Windows Defender Security.exe 90 PID 3888 wrote to memory of 2920 3888 Windows Defender Security.exe 92 PID 3888 wrote to memory of 2920 3888 Windows Defender Security.exe 92 PID 3888 wrote to memory of 2920 3888 Windows Defender Security.exe 92 PID 2920 wrote to memory of 4956 2920 cmd.exe 94 PID 2920 wrote to memory of 4956 2920 cmd.exe 94 PID 2920 wrote to memory of 4956 2920 cmd.exe 94 PID 3888 wrote to memory of 2924 3888 Windows Defender Security.exe 101 PID 3888 wrote to memory of 2924 3888 Windows Defender Security.exe 101 PID 3888 wrote to memory of 2924 3888 Windows Defender Security.exe 101 PID 2924 wrote to memory of 4904 2924 cmd.exe 103 PID 2924 wrote to memory of 4904 2924 cmd.exe 103 PID 2924 wrote to memory of 4904 2924 cmd.exe 103 PID 2924 wrote to memory of 2708 2924 cmd.exe 104 PID 2924 wrote to memory of 2708 2924 cmd.exe 104 PID 2924 wrote to memory of 2708 2924 cmd.exe 104 PID 2924 wrote to memory of 2316 2924 cmd.exe 107 PID 2924 wrote to memory of 2316 2924 cmd.exe 107 PID 2924 wrote to memory of 2316 2924 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7d70adb404cf63562d6541fce16ee94_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3728
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3632
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LU10cNgBx71j.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
219B
MD5d2cc99b155abfd1dfa36d7f78460ca76
SHA1eb2daf21bd8a6cbff05bb593f33c2e9a08dbae7a
SHA256df55af02258a355c4271808d6e914ae92184a8d102a10a85ea305fba5c790b75
SHA5120b12ea67fe1429acb92f8dfae6a1f30ab7b0e585f9dac580c27242067649937228b5ac5ec593140cea8aa761dfdc1355b4996d4ea442e22fb03f79fad9f41879
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
535KB
MD56f3b107a20b18244efb6473bae2544b1
SHA1dc02ec107547c515bffeadcd87e6308c3bdfd390
SHA2562b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0
SHA512318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c