Overview
overview
7Static
static
32952565af3...18.exe
windows7-x64
72952565af3...18.exe
windows10-2004-x64
7$0/queryscan.dll
windows7-x64
1$0/queryscan.dll
windows10-2004-x64
1$0/queryscan.exe
windows7-x64
3$0/queryscan.exe
windows10-2004-x64
3$0/uninstall.exe
windows7-x64
7$0/uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$0/queryscan.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$0/queryscan.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$0/queryscan.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$0/queryscan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$0/uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$0/uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe
-
Size
698KB
-
MD5
2952565af33a0cb6a73ba71ac682af7b
-
SHA1
00d86920186b966ecdc9af702f92fc18954cd1d9
-
SHA256
742f5cf6c1a88e32ee398e3523a57cce43046c2e056546a055516fe53a9cdb5b
-
SHA512
d58015ff7a83bea56b0bc8b9189fe9ebd5dbf8ac1e8cb125eb570fd9b131b9d2c8dff9e10918bde4fd41daeb5eb04b2b936d58ccf868c437e4a6a77c20e5fad0
-
SSDEEP
12288:pCldMgQ//KsoLGO/nHokkiMew+AWTVhJEKA0RC66pa3kRelbh8hpEbIzjA:pX//KsyGO/Iklxbr+X0RX8UkIGxs
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4676 queryscan.exe 2972 queryscan.exe 808 queryscan142.exe 2968 queryscan.exe -
Loads dropped DLL 8 IoCs
pid Process 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 2972 queryscan.exe 808 queryscan142.exe 2968 queryscan.exe 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 queryscan142.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE queryscan142.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies queryscan142.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 queryscan142.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\8X4B9UMS.htm queryscan142.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\QueryScan\queryscan.dll queryscan.exe File created C:\Program Files (x86)\QueryScan\queryscan.exe queryscan.exe File created C:\Program Files (x86)\QueryScan\uninstall.exe 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe File created C:\Program Files (x86)\QueryScan\queryscan.dll queryscan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language queryscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language queryscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language queryscan142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language queryscan.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b90-116.dat nsis_installer_1 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53}\DisplayName = "QueryScan" queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53}\URL = "http://www.queryscan.com/?prt=QUERYSCAN142&keywords={searchTerms}" queryscan.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\TopResultURLFallback = "http://www.queryscan.com/?tmp=redir_bho_bing&dist=0&prt=QUERYSCAN142&keywords={searchTerms}" queryscan.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53}\TopResultURLFallback = "http://www.queryscan.com/?tmp=redir_bho_bing&dist=0&prt=QUERYSCAN142&keywords={searchTerms}" queryscan.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\SearchScopes queryscan.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{1B302FEF-4F0F-4AC1-8C23-8A96D79F4A53} queryscan.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" queryscan142.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" queryscan142.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix queryscan142.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" queryscan142.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" queryscan142.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe 808 queryscan142.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2968 queryscan.exe 2968 queryscan.exe 2968 queryscan.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4676 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 86 PID 2588 wrote to memory of 4676 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 86 PID 2588 wrote to memory of 4676 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 86 PID 2588 wrote to memory of 2972 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 87 PID 2588 wrote to memory of 2972 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 87 PID 2588 wrote to memory of 2972 2588 2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe 87 PID 808 wrote to memory of 2968 808 queryscan142.exe 89 PID 808 wrote to memory of 2968 808 queryscan142.exe 89 PID 808 wrote to memory of 2968 808 queryscan142.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2952565af33a0cb6a73ba71ac682af7b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\nsuC5D3.tmp\queryscan.exe"C:\Users\Admin\AppData\Local\Temp\nsuC5D3.tmp\queryscan.exe" "C:\Users\Admin\AppData\Local\Temp\nsuC5D3.tmp\queryscan.dll" 6452354592⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\nsuC5D3.tmp\queryscan.exe"C:\Users\Admin\AppData\Local\Temp\nsuC5D3.tmp\queryscan.exe" "C:\Users\Admin\AppData\Local\Temp\nsuC5D3.tmp\queryscan.dll" idifunofo " " gudotocab2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2972
-
-
C:\ProgramData\QueryScan\queryscan142.exe"C:\ProgramData\QueryScan\queryscan142.exe" "C:\Program Files (x86)\QueryScan\queryscan.dll" ovekisap nujigupu1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\QueryScan\queryscan.exe"C:\Program Files (x86)\QueryScan\queryscan.exe" "C:\Program Files (x86)\QueryScan\queryscan.dll" tocaburoja woxasekeh2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5d765c492c21689e3d9d61634371fd861
SHA1ac200933671ae52c9d5544d0e2e8e9144d286c83
SHA256551e6042dd494ea01549555ffc194ab9729da09058ec714eb368dd06642c9bbc
SHA5129919a9e848c8f1e26c75d0d29207571e4b86a4140bd554743d2c1f8bd7f386fe4919345b163d89a5d907fb165e435ba0ac5f6b1101713636141f156a420e2e0f
-
Filesize
10KB
MD5fe24766ba314f620d57d0cf7339103c0
SHA18641545f03f03ff07485d6ec4d7b41cbb898c269
SHA256802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd
SHA51260d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3
-
Filesize
612B
MD5dc2307a01631b598a79a8855ddf8cbb6
SHA19c5f22916b18f0fc0d954d1cf0dc9c348bd5072c
SHA256fafeb5093f3d9d5ec777bad34d57e9fe01bc4c64122dd7b8ab9d7388bc421790
SHA5126e22c6c59a04b08c7e21cee36897c39363798a7ecbe9810b2ce26e3b002506ac7881f8b6e1d6d37afbcbc6e31d7c44a5ceae12b57ddbcbc2ff5a9dc234683713
-
Filesize
612B
MD5ac29b1c93e847c4ef967ab4083dd9ac0
SHA14ca5f486984b4a3b315d549e93ea4df80dada665
SHA2564fbdd1fccd58cc4149072371664005c75f7d9fd096cf1a28446688c820ed1e4c
SHA5129b45fd2bffc564a31e3e7bde9589aead754b4a2bf187bddfe4484579a5f2b64882e9b15e265cde81faf29c1c19a21c6b368f9dc2717b2b9c2936e863f75dfd8e
-
Filesize
750B
MD5cb1304ba6ebced4ae3ca0bbb623721de
SHA184b0401f0b02215e0f23137a3f97032f840331a1
SHA256b49b5d354387eae5cb0cf9293deade20ed61d6c64f4df00eaa4e8b316ebb8487
SHA512d88a1098e23992661adf42afe676ccc3ff637b0b863bcc438e4b301b1139d4c5ddb6b8fe62facfcc1fb9a0b27cee703df94f1b03753e5c3b2acdde5d8f0a1e33
-
Filesize
576KB
MD5d37dfa156393bc963135204ca258d9bc
SHA10c1da26fb8872ac431f3eecb2f08f0b4a894f697
SHA2567f0b8cab7bd5a65566f512f0b9d62668a0c5ef11adb3029f43a1911a2f7909a5
SHA51273989a91e7380c6a7ecdedc0f24888894c60fc16d30244eeecd862b92568e71118305da6c9f2357cbc7f6bd5bda2211a1cca17e4f4ae8b2465628a3d810861fc
-
Filesize
25KB
MD5d9e855c7182e25f5c9d8f234234c8787
SHA1c1bded1b95cd50f2292f3b21e8ca9123bc798edc
SHA2566ccd36338173ace5eb07a6bb97620d9c5ab1222363b33a924b273a4e7f631fd3
SHA5120471715589e4730f6eee9e20356ed3da2e30405956cab4839fa6aa0f084366d156639c4fc6c1e6a4fa17cff678c1411dd1f4e951bf02e41733650f406131d933
-
Filesize
78KB
MD5bb6e99a6101293b86ba5478b1d1e1193
SHA1e7766fad214954ef27a14144b6fb769362701555
SHA25644625efb63fb453277c586f78c3926bad2e33719f26319d13ba88c606a195a8e
SHA512e8fc516539a103e7f336f166a8ae1e7711ec4f4b58f4c878a0db1872f67c91769b1025cc823faab0d4149971bbe5598411579841698bd902d5156f71002e4e2a