Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe
-
Size
96KB
-
MD5
03f891aeb8fd33cd03997d9bcc61d226
-
SHA1
bb12d2d8bc7d3e049cdcda106a14090ee040402f
-
SHA256
04fd4bdd959ef2dbc5b2cfa6bbd3c43ab6efe17f8b7b207674609632366ecaa3
-
SHA512
86a7d98adc152b936dde1ccf424b006037761a9759d37156bdf9f2e84c8187f8ea06696b2863f812b2c08b4ca9c16af05a3eecf1b23a336056c25d8a23e55cbb
-
SSDEEP
768:6QRDFK7Eii2bH6euqSQ77Vh1P1BL6C26Ks1QWDC19Q26nfaslZTb:6QRQw72baejLZ31Qd165fXF
Malware Config
Extracted
guloader
https://bngsmartshop.com/frank.bin
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 filename1.exe -
Loads dropped DLL 1 IoCs
pid Process 3088 filename1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\subfolder1\\filename1.vbs" 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\subfolder1\\filename1.vbs" filename1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 4012 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2052 filename1.exe 3088 filename1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 932 set thread context of 4012 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 85 PID 2052 set thread context of 3088 2052 filename1.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2052 filename1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2052 filename1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 932 wrote to memory of 4012 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 85 PID 932 wrote to memory of 4012 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 85 PID 932 wrote to memory of 4012 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 85 PID 932 wrote to memory of 4012 932 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 85 PID 4012 wrote to memory of 2052 4012 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 86 PID 4012 wrote to memory of 2052 4012 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 86 PID 4012 wrote to memory of 2052 4012 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 86 PID 2052 wrote to memory of 3088 2052 filename1.exe 87 PID 2052 wrote to memory of 3088 2052 filename1.exe 87 PID 2052 wrote to memory of 3088 2052 filename1.exe 87 PID 2052 wrote to memory of 3088 2052 filename1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\subfolder1\filename1.exe"C:\Users\Admin\subfolder1\filename1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\subfolder1\filename1.exe"C:\Users\Admin\subfolder1\filename1.exe"4⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD503f891aeb8fd33cd03997d9bcc61d226
SHA1bb12d2d8bc7d3e049cdcda106a14090ee040402f
SHA25604fd4bdd959ef2dbc5b2cfa6bbd3c43ab6efe17f8b7b207674609632366ecaa3
SHA51286a7d98adc152b936dde1ccf424b006037761a9759d37156bdf9f2e84c8187f8ea06696b2863f812b2c08b4ca9c16af05a3eecf1b23a336056c25d8a23e55cbb