Overview
overview
7Static
static
32952565af3...18.exe
windows7-x64
72952565af3...18.exe
windows10-2004-x64
7$0/queryscan.dll
windows7-x64
1$0/queryscan.dll
windows10-2004-x64
1$0/queryscan.exe
windows7-x64
3$0/queryscan.exe
windows10-2004-x64
3$0/uninstall.exe
windows7-x64
7$0/uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:37
Static task
static1
Behavioral task
behavioral1
Sample
2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$0/queryscan.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$0/queryscan.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$0/queryscan.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$0/queryscan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$0/uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$0/uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe
-
Size
698KB
-
MD5
2952565af33a0cb6a73ba71ac682af7b
-
SHA1
00d86920186b966ecdc9af702f92fc18954cd1d9
-
SHA256
742f5cf6c1a88e32ee398e3523a57cce43046c2e056546a055516fe53a9cdb5b
-
SHA512
d58015ff7a83bea56b0bc8b9189fe9ebd5dbf8ac1e8cb125eb570fd9b131b9d2c8dff9e10918bde4fd41daeb5eb04b2b936d58ccf868c437e4a6a77c20e5fad0
-
SSDEEP
12288:pCldMgQ//KsoLGO/nHokkiMew+AWTVhJEKA0RC66pa3kRelbh8hpEbIzjA:pX//KsyGO/Iklxbr+X0RX8UkIGxs
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2452 queryscan.exe 3012 queryscan.exe 2940 queryscan142.exe 1292 queryscan.exe -
Loads dropped DLL 13 IoCs
pid Process 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 3012 queryscan.exe 2940 queryscan142.exe 2940 queryscan142.exe 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 2940 queryscan142.exe 1292 queryscan.exe 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat queryscan142.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E97SM3BG.htm queryscan142.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\QueryScan\queryscan.dll queryscan.exe File created C:\Program Files (x86)\QueryScan\queryscan.exe queryscan.exe File created C:\Program Files (x86)\QueryScan\uninstall.exe 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe File created C:\Program Files (x86)\QueryScan\queryscan.dll queryscan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language queryscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language queryscan142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language queryscan.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019494-128.dat nsis_installer_1 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53} queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53}\DisplayName = "QueryScan" queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53}\URL = "http://www.queryscan.com/?prt=QUERYSCAN142&keywords={searchTerms}" queryscan.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\TopResultURLFallback.Save = "http://www.bing.com/search?q={searchTerms}&src=IE-TopResult&FORM=IE11TR" queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\TopResultURLFallback = "http://www.queryscan.com/?tmp=redir_bho_bing&dist=0&prt=QUERYSCAN142&keywords={searchTerms}" queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53}\TopResultURLFallback = "http://www.queryscan.com/?tmp=redir_bho_bing&dist=0&prt=QUERYSCAN142&keywords={searchTerms}" queryscan.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes queryscan.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections queryscan142.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 queryscan142.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings queryscan142.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-e7-a9-ca-56-17\WpadDecision = "0" queryscan142.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" queryscan142.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" queryscan142.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" queryscan142.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9483CAF8-8951-45AB-8058-F7CA6C5C239A}\56-e7-a9-ca-56-17 queryscan142.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix queryscan142.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings queryscan142.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9483CAF8-8951-45AB-8058-F7CA6C5C239A} queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9483CAF8-8951-45AB-8058-F7CA6C5C239A}\WpadDecisionReason = "1" queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9483CAF8-8951-45AB-8058-F7CA6C5C239A}\WpadDecision = "0" queryscan142.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9483CAF8-8951-45AB-8058-F7CA6C5C239A}\WpadNetworkName = "Network 3" queryscan142.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-e7-a9-ca-56-17 queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" queryscan142.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad queryscan142.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ce000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 queryscan142.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9483CAF8-8951-45AB-8058-F7CA6C5C239A}\WpadDecisionTime = b0f994a2361adb01 queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-e7-a9-ca-56-17\WpadDecisionReason = "1" queryscan142.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-e7-a9-ca-56-17\WpadDecisionTime = b0f994a2361adb01 queryscan142.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe 2940 queryscan142.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1292 queryscan.exe 1292 queryscan.exe 1292 queryscan.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2452 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2452 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2452 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2452 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 30 PID 1992 wrote to memory of 3012 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 31 PID 1992 wrote to memory of 3012 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 31 PID 1992 wrote to memory of 3012 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 31 PID 1992 wrote to memory of 3012 1992 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 31 PID 2940 wrote to memory of 1292 2940 queryscan142.exe 33 PID 2940 wrote to memory of 1292 2940 queryscan142.exe 33 PID 2940 wrote to memory of 1292 2940 queryscan142.exe 33 PID 2940 wrote to memory of 1292 2940 queryscan142.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\nsjAC3A.tmp\queryscan.exe"C:\Users\Admin\AppData\Local\Temp\nsjAC3A.tmp\queryscan.exe" "C:\Users\Admin\AppData\Local\Temp\nsjAC3A.tmp\queryscan.dll" 6452354592⤵
- Executes dropped EXE
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\nsjAC3A.tmp\queryscan.exe"C:\Users\Admin\AppData\Local\Temp\nsjAC3A.tmp\queryscan.exe" "C:\Users\Admin\AppData\Local\Temp\nsjAC3A.tmp\queryscan.dll" idifunofo " " gudotocab2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3012
-
-
C:\ProgramData\QueryScan\queryscan142.exe"C:\ProgramData\QueryScan\queryscan142.exe" "C:\Program Files (x86)\QueryScan\queryscan.dll" ovekisap nujigupu1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\QueryScan\queryscan.exe"C:\Program Files (x86)\QueryScan\queryscan.exe" "C:\Program Files (x86)\QueryScan\queryscan.dll" tocaburoja woxasekeh2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612B
MD5e78ea1c368e193e4dabbe7537b9fe5ca
SHA1d32a426df6267a117dacccb007a9a0d2ca8e1b57
SHA256cfa4b50134b586734aa656ecda06deeb8ea3e70359d3d2b21e6344157bdb8969
SHA51227134501594584b34362c367865dfe091e753a74a5548e0384f87fd03b3b3ce4fc9c8a22c73c2928eaeccad2641cc01c50af6312d9861bafed3aaba4e38fab25
-
Filesize
750B
MD5ed444fe1391075ab21123dc551d7ecad
SHA16592867a06875ba401ef2e41704122285f2b9718
SHA256a1ca8bd21aba8d232c46afbf7e533246f7d13bbaa73435b7836ec8e8db446648
SHA512bfc7fa313dd9f0ed4408e983ac1fe7ae466366d286b204d68a653338e6b942be08a00e1e27135aca79a70d9500eea8444fa6c60b2d31b7fcf021181a0822320d
-
Filesize
576KB
MD5d37dfa156393bc963135204ca258d9bc
SHA10c1da26fb8872ac431f3eecb2f08f0b4a894f697
SHA2567f0b8cab7bd5a65566f512f0b9d62668a0c5ef11adb3029f43a1911a2f7909a5
SHA51273989a91e7380c6a7ecdedc0f24888894c60fc16d30244eeecd862b92568e71118305da6c9f2357cbc7f6bd5bda2211a1cca17e4f4ae8b2465628a3d810861fc
-
Filesize
576KB
MD544870576e69024e79a2dddc9afe0d2ce
SHA1ab20f8bb36340611dc5f94f5d309cbb47b8a5cc7
SHA256e1b671e2ba6091f973fc63aec6d75a5afbdaf61c1a4280ec7fa24a20fc479e18
SHA5125cd9d58a6ac83830bc39fdaf6f0e46b3685adb5c62506b835610786b3b574fc8bbe4f06d9507af4d300d228fa05fea1122b69cfd2b9a5abb42f855ce6e0d618a
-
Filesize
78KB
MD5bb6e99a6101293b86ba5478b1d1e1193
SHA1e7766fad214954ef27a14144b6fb769362701555
SHA25644625efb63fb453277c586f78c3926bad2e33719f26319d13ba88c606a195a8e
SHA512e8fc516539a103e7f336f166a8ae1e7711ec4f4b58f4c878a0db1872f67c91769b1025cc823faab0d4149971bbe5598411579841698bd902d5156f71002e4e2a
-
Filesize
13KB
MD5d765c492c21689e3d9d61634371fd861
SHA1ac200933671ae52c9d5544d0e2e8e9144d286c83
SHA256551e6042dd494ea01549555ffc194ab9729da09058ec714eb368dd06642c9bbc
SHA5129919a9e848c8f1e26c75d0d29207571e4b86a4140bd554743d2c1f8bd7f386fe4919345b163d89a5d907fb165e435ba0ac5f6b1101713636141f156a420e2e0f
-
Filesize
10KB
MD5fe24766ba314f620d57d0cf7339103c0
SHA18641545f03f03ff07485d6ec4d7b41cbb898c269
SHA256802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd
SHA51260d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3
-
Filesize
25KB
MD5d9e855c7182e25f5c9d8f234234c8787
SHA1c1bded1b95cd50f2292f3b21e8ca9123bc798edc
SHA2566ccd36338173ace5eb07a6bb97620d9c5ab1222363b33a924b273a4e7f631fd3
SHA5120471715589e4730f6eee9e20356ed3da2e30405956cab4839fa6aa0f084366d156639c4fc6c1e6a4fa17cff678c1411dd1f4e951bf02e41733650f406131d933