Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
ddef8abb1f0a772d1b6f3e6931dd2e3d_JaffaCakes118.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ddef8abb1f0a772d1b6f3e6931dd2e3d_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
ddef8abb1f0a772d1b6f3e6931dd2e3d_JaffaCakes118.dll
-
Size
2.9MB
-
MD5
ddef8abb1f0a772d1b6f3e6931dd2e3d
-
SHA1
227e55ff077f997f601459ca78a49cc15b970dd4
-
SHA256
73bf5bec1f9a1a089ed27964a354858e5661822882883394ed2d1a9ed241b348
-
SHA512
9f6a2354dc209f284a8ab98126a1a8c8a8d4142be0992648f94222924a2b7504230167f5849538559cfb961513e81bbd7b91288f6bdef53bb4f03edfe8971080
-
SSDEEP
49152:s1Wpz744WsmBtUQDY8rwSWss9Dq/PyZy8rA3mcxrLZhG3GRcwXQ8d1s:OWC4WzBtRY8r1Welm+LZhVG
Malware Config
Extracted
quasar
1.4.0
WindowsDefender
timeserver-ts1.redirectme.net:4545
38846eaf-4c33-4e2e-b206-1f55763a931c
-
encryption_key
4831379DBBBCBA15F0105372CB435E62F03DFA1E
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2864-2-0x00000000055D0000-0x000000000589A000-memory.dmp family_quasar -
Blocklisted process makes network request 7 IoCs
flow pid Process 3 2864 rundll32.exe 4 2864 rundll32.exe 5 2864 rundll32.exe 7 2864 rundll32.exe 8 2864 rundll32.exe 9 2864 rundll32.exe 11 2864 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2864 2804 rundll32.exe 30 PID 2804 wrote to memory of 2864 2804 rundll32.exe 30 PID 2804 wrote to memory of 2864 2804 rundll32.exe 30 PID 2804 wrote to memory of 2864 2804 rundll32.exe 30 PID 2804 wrote to memory of 2864 2804 rundll32.exe 30 PID 2804 wrote to memory of 2864 2804 rundll32.exe 30 PID 2804 wrote to memory of 2864 2804 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddef8abb1f0a772d1b6f3e6931dd2e3d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddef8abb1f0a772d1b6f3e6931dd2e3d_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2864
-