General
-
Target
8aa12cb7cad072737aa9541b636a68bb_JaffaCakes118
-
Size
2.2MB
-
Sample
240601-q2pgaadg81
-
MD5
8aa12cb7cad072737aa9541b636a68bb
-
SHA1
45b5e9bfda12f5de1338ca330b08132317684737
-
SHA256
12415ec74ab9a1facbbda22b5618d4aaed954a880f7db45406060f2f252a015f
-
SHA512
fca92073ee608b8233fa26079a5f55b5b4b118a48029b943987037cea7302806eb2bb601f8ff5e3715e3d46ca5f27941667c241148314b194eedfc2dd7bb96c8
-
SSDEEP
49152:gz9oY5v/t14EmN0v8X4NbyhXers4a5ppHdKoCgzSZp6UzsGre245snxNX99AeP:KB5Hf4EmN0UXvia5vHcDgzSfB7iT0x
Static task
static1
Behavioral task
behavioral1
Sample
8aa12cb7cad072737aa9541b636a68bb_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
31.200.226.140:4782
QSR_MUTEX_2PSnv6ikiCGVKIYz02
-
encryption_key
YGysf4cKdIIApRvwDlWm
-
install_name
svchot.exe
-
log_directory
Logss
-
reconnect_delay
3000
-
startup_key
Microsoft Update
-
subdirectory
SubDir
Targets
-
-
Target
8aa12cb7cad072737aa9541b636a68bb_JaffaCakes118
-
Size
2.2MB
-
MD5
8aa12cb7cad072737aa9541b636a68bb
-
SHA1
45b5e9bfda12f5de1338ca330b08132317684737
-
SHA256
12415ec74ab9a1facbbda22b5618d4aaed954a880f7db45406060f2f252a015f
-
SHA512
fca92073ee608b8233fa26079a5f55b5b4b118a48029b943987037cea7302806eb2bb601f8ff5e3715e3d46ca5f27941667c241148314b194eedfc2dd7bb96c8
-
SSDEEP
49152:gz9oY5v/t14EmN0v8X4NbyhXers4a5ppHdKoCgzSZp6UzsGre245snxNX99AeP:KB5Hf4EmN0UXvia5vHcDgzSfB7iT0x
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-