Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 05:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe
-
Size
950KB
-
MD5
50009ad06a8632a37995f4a94dc76278
-
SHA1
3105b87fee58f39090ae3cbeb9d09513e5ef3f69
-
SHA256
44b801fdbc011ac9bec93c1e9fde044e88ea76605b7a1ea5988021ddbf58f6d4
-
SHA512
2dd4682d736d05b1e845b314234f98b8de554d47618914ae3b9b2e359e76da098dae675c68b8db9c9e14b51ca209f573d758229175abfd2febd270a78bbf7d1a
-
SSDEEP
24576:1ecCy8fWvhaLU+4tCKsu4JRfl8S7U2MQGmP:hugHt78
Malware Config
Extracted
quasar
1.4.0
Script Kiddie
NaziSec2-64817.portmap.io:64817
01912710-4689-49d7-8331-827532b3887f
-
encryption_key
082CB3A67AAB74DC729A374C73C4CFE478208DA9
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x000a00000001202c-5.dat family_quasar behavioral1/memory/2840-10-0x0000000000CF0000-0x0000000000D7A000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2840 Temp4pfwaqchnlc.exe -
Loads dropped DLL 1 IoCs
pid Process 1100 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2816 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2816 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe Token: SeDebugPrivilege 2840 Temp4pfwaqchnlc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 Temp4pfwaqchnlc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2840 Temp4pfwaqchnlc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1100 wrote to memory of 2840 1100 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe 29 PID 1100 wrote to memory of 2840 1100 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe 29 PID 1100 wrote to memory of 2840 1100 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe 29 PID 1100 wrote to memory of 2840 1100 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe 29 PID 2840 wrote to memory of 2000 2840 Temp4pfwaqchnlc.exe 30 PID 2840 wrote to memory of 2000 2840 Temp4pfwaqchnlc.exe 30 PID 2840 wrote to memory of 2000 2840 Temp4pfwaqchnlc.exe 30 PID 2000 wrote to memory of 2800 2000 cmd.exe 32 PID 2000 wrote to memory of 2800 2000 cmd.exe 32 PID 2000 wrote to memory of 2800 2000 cmd.exe 32 PID 2000 wrote to memory of 2816 2000 cmd.exe 33 PID 2000 wrote to memory of 2816 2000 cmd.exe 33 PID 2000 wrote to memory of 2816 2000 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp4pfwaqchnlc.exe"C:\Users\Admin\AppData\Local\Temp4pfwaqchnlc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\losFWz5IAbL9.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD54a57eba814db851735a51539a2fea60e
SHA191a00d021586d9c725e97db0efb64ec8b79d4b76
SHA256ff06d2ba78989cfcfe66e2c9119991a622c33aa28430cf180e2f11da32072315
SHA51247e75b37c825a9b30aa0d588dfe1f27472b935d62f08fcae88ab1b9cc65f4880978848ff0be47955193711102ec3caf3454a423969164e8082a9a3eecd6c9f2c
-
Filesize
530KB
MD565db4c1db9e3e805f3d64075c1ec2462
SHA14f45cd138718bbba73382ff3f1dd7b91e612b5ba
SHA256a83311053c76e3a3688b5798d9ed1c6ba9cd918b7188e0285cafdcb282820498
SHA51228b7470916ce0e083ec182c66296a9f76523aacb5ecde8fc047e0cc955ab50dcba911803ef23b2186af3c3b4d8f64c4b1b94632d396c789b425b75105028626a