Analysis

  • max time kernel
    135s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 08:43

General

  • Target

    JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe

  • Size

    844KB

  • MD5

    98600590c6930d77cb2436917e666cb9

  • SHA1

    e31ab0e597082ee1e415d0523a13b5d9175963c9

  • SHA256

    435385b409d5a3b1868b6d25016b9deb9ae6dd488341a0ab7af6ba345be1b376

  • SHA512

    55f3d5ebb77d2448bc961406967e2642dd720bba0d8278421cba27c8e3a18578f8ba85edb3a7072ed3032edd6f411225245ab9ff42cb85afd40b697d3e6af237

  • SSDEEP

    12288:1l94NkE0XOHXzMidGXY4LzPkTOAO+u8ixFUibMcXVY+RWb/vu7ZxNRf9XB5b:XVE0SdGXY4n4O+KIIYm6ebNh9RN

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Tahpdhij.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\xF6XUFcvnMkx.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2892
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2916
        • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe
          "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:344
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Tahpdhij.vbs"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1324
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1760
          • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe
            C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1192
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\t33pKnvN6w34.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1416
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1716
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:688
              • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe
                "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98600590c6930d77cb2436917e666cb9.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_Tahpdhij.vbs

    Filesize

    181B

    MD5

    f1502081d1172131e3d33d384d1adb56

    SHA1

    85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

    SHA256

    e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

    SHA512

    5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

  • C:\Users\Admin\AppData\Local\Temp\t33pKnvN6w34.bat

    Filesize

    243B

    MD5

    7d2c675f1b81750b9c32d8b35e778605

    SHA1

    83b49eb0aa71da3c0ccbaba0344511a25f8d1bc7

    SHA256

    cbb4d981e016ad968563ec4441a35dbf594f8223dee2c5ba3bf636a33971e1e0

    SHA512

    0bb97409c8d42488f500a3fc11febf12029e71724bf0dcf064ec00d92579c756d2286c8b5ebf4b0570c7b2d16b3e6d35282009900ae4ceef349016d7725ad22f

  • C:\Users\Admin\AppData\Local\Temp\xF6XUFcvnMkx.bat

    Filesize

    243B

    MD5

    43c836a3bbd1c28c493d3c76a3fe6cc7

    SHA1

    b925dbc0765408d2490e1d1e58436f16e67ca7a7

    SHA256

    72c6047b1aff1eb054cd5dd285c7b7159eec0feb7d9060301addc43bce7ac4da

    SHA512

    5d5e88c0072ba46580f659a709470cdc19ecbd57727edf2f4947e748b412537392e26606e6927b61f09dd8cad2e8753e1a009b6349acbe2f5e4e3053ec514740

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    43e8cd9086c9d0e8364dccde88a5e816

    SHA1

    258e32c1e710a1b686eb0b40bc897aa755a1fee9

    SHA256

    d82dc737cb53e200f9534ffecc71a25ef20ed03f9157a412a7ca20975e7ba11e

    SHA512

    a64e2fbfef64fb377bd727942ebe58867c078f843aa701bcbde9976c93718bc925b139cd0b78ca5edae9a024b3c78c47f92a827e6f525d6c90adf47cff9d7c32

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe

    Filesize

    844KB

    MD5

    98600590c6930d77cb2436917e666cb9

    SHA1

    e31ab0e597082ee1e415d0523a13b5d9175963c9

    SHA256

    435385b409d5a3b1868b6d25016b9deb9ae6dd488341a0ab7af6ba345be1b376

    SHA512

    55f3d5ebb77d2448bc961406967e2642dd720bba0d8278421cba27c8e3a18578f8ba85edb3a7072ed3032edd6f411225245ab9ff42cb85afd40b697d3e6af237

  • memory/344-39-0x0000000001070000-0x000000000114A000-memory.dmp

    Filesize

    872KB

  • memory/1192-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1192-56-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/1192-57-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/1436-73-0x0000000000010000-0x00000000000EA000-memory.dmp

    Filesize

    872KB

  • memory/2756-11-0x0000000000790000-0x00000000007D6000-memory.dmp

    Filesize

    280KB

  • memory/2756-0-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB

  • memory/2756-1-0x0000000000F90000-0x000000000106A000-memory.dmp

    Filesize

    872KB

  • memory/2756-27-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2756-2-0x00000000748EE000-0x00000000748EF000-memory.dmp

    Filesize

    4KB

  • memory/2756-3-0x0000000004CD0000-0x0000000004D8C000-memory.dmp

    Filesize

    752KB

  • memory/2756-4-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2756-5-0x00000000748E0000-0x0000000074FCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2904-24-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2904-12-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2904-16-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2904-14-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2904-18-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2904-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2904-21-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2904-26-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB