Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 05:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe
-
Size
950KB
-
MD5
50009ad06a8632a37995f4a94dc76278
-
SHA1
3105b87fee58f39090ae3cbeb9d09513e5ef3f69
-
SHA256
44b801fdbc011ac9bec93c1e9fde044e88ea76605b7a1ea5988021ddbf58f6d4
-
SHA512
2dd4682d736d05b1e845b314234f98b8de554d47618914ae3b9b2e359e76da098dae675c68b8db9c9e14b51ca209f573d758229175abfd2febd270a78bbf7d1a
-
SSDEEP
24576:1ecCy8fWvhaLU+4tCKsu4JRfl8S7U2MQGmP:hugHt78
Malware Config
Extracted
quasar
1.4.0
Script Kiddie
NaziSec2-64817.portmap.io:64817
01912710-4689-49d7-8331-827532b3887f
-
encryption_key
082CB3A67AAB74DC729A374C73C4CFE478208DA9
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000d000000023b7f-7.dat family_quasar behavioral2/memory/3148-15-0x0000000000A20000-0x0000000000AAA000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Tempuzkd4ag4vzc.exe -
Executes dropped EXE 1 IoCs
pid Process 3148 Tempuzkd4ag4vzc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 448 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 448 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1604 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe Token: SeDebugPrivilege 3148 Tempuzkd4ag4vzc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3148 Tempuzkd4ag4vzc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3148 Tempuzkd4ag4vzc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1604 wrote to memory of 3148 1604 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe 84 PID 1604 wrote to memory of 3148 1604 JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe 84 PID 3148 wrote to memory of 2184 3148 Tempuzkd4ag4vzc.exe 85 PID 3148 wrote to memory of 2184 3148 Tempuzkd4ag4vzc.exe 85 PID 2184 wrote to memory of 1828 2184 cmd.exe 87 PID 2184 wrote to memory of 1828 2184 cmd.exe 87 PID 2184 wrote to memory of 448 2184 cmd.exe 88 PID 2184 wrote to memory of 448 2184 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50009ad06a8632a37995f4a94dc76278.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Tempuzkd4ag4vzc.exe"C:\Users\Admin\AppData\Local\Tempuzkd4ag4vzc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\02EeN02qtsLy.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:1828
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD56928dba06ad822c1cc80e8edf4a33ffa
SHA1ba39e6be153e262e1a7ef0c50eb444a1b0230499
SHA2568e499f619f9af85093c8c1486428ea7c545c324c82d0f6134a153aeb17fb1847
SHA512fda14a7e95f45ae2dce1725542300b472430f1766af7f1b6764b7fc6d961f6f09ba3e7eea9ba87a4cb798a98dff96c7da43d6e8da12c38926e8ce7ab5eecd9a3
-
Filesize
530KB
MD565db4c1db9e3e805f3d64075c1ec2462
SHA14f45cd138718bbba73382ff3f1dd7b91e612b5ba
SHA256a83311053c76e3a3688b5798d9ed1c6ba9cd918b7188e0285cafdcb282820498
SHA51228b7470916ce0e083ec182c66296a9f76523aacb5ecde8fc047e0cc955ab50dcba911803ef23b2186af3c3b4d8f64c4b1b94632d396c789b425b75105028626a