Analysis Overview
SHA256
3fdc70759c5fb107d6eeb6b5be8fb50170e81ba1099dfa1ba30d6605d3264211
Threat Level: Known bad
The file 639cb459c7bf64f47b7376a85b73a5b9_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Guloader,Cloudeye
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Adds Run key to start application
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-21 14:27
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-21 14:27
Reported
2024-05-21 14:29
Platform
win7-20240508-en
Max time kernel
150s
Max time network
149s
Command Line
Signatures
Guloader,Cloudeye
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2420 set thread context of 2188 | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe |
| PID 3004 set thread context of 2744 | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | C:\Users\Admin\Sandsynliggres\rainmak.exe |
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe
"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe
"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"
C:\Users\Admin\Sandsynliggres\rainmak.exe
"C:\Users\Admin\Sandsynliggres\rainmak.exe"
C:\Users\Admin\Sandsynliggres\rainmak.exe
"C:\Users\Admin\Sandsynliggres\rainmak.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| US | 13.107.137.11:443 | tcp |
Files
memory/2420-2-0x00000000004E0000-0x00000000004E7000-memory.dmp
memory/2188-9-0x00000000771E0000-0x0000000077389000-memory.dmp
memory/2420-8-0x00000000771E0000-0x0000000077389000-memory.dmp
memory/2188-5-0x0000000000400000-0x00000000004DF000-memory.dmp
memory/2420-4-0x00000000004E0000-0x00000000004E7000-memory.dmp
memory/2420-3-0x00000000771E1000-0x00000000772E2000-memory.dmp
\Users\Admin\Sandsynliggres\rainmak.exe
| MD5 | b17644b26f54aee17d39cb7bfceee846 |
| SHA1 | a6b0b1155257bbaf9d710fd8d9b92b94601d82d9 |
| SHA256 | 6f840786f7756f4b7bd84cfc327477af8a3aa99ba9768581f52a7ba3df9af806 |
| SHA512 | bad64051fe0604f25630515ffa703304c153752664b846f1f90e8dc0d3bd3c426ccef8b169f013ba3d49dbaf4715be39ae3a0e8ff08ea6177427b22f459eeb93 |
memory/2188-19-0x0000000000400000-0x00000000004DF000-memory.dmp
memory/3004-24-0x00000000002A0000-0x00000000002A7000-memory.dmp
memory/2744-28-0x00000000771E0000-0x0000000077389000-memory.dmp
memory/3004-27-0x00000000773D0000-0x00000000774A6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Cab319D.tmp
| MD5 | 29f65ba8e88c063813cc50a4ea544e93 |
| SHA1 | 05a7040d5c127e68c25d81cc51271ffb8bef3568 |
| SHA256 | 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184 |
| SHA512 | e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa |
C:\Users\Admin\AppData\Local\Temp\Tar31B0.tmp
| MD5 | 435a9ac180383f9fa094131b173a2f7b |
| SHA1 | 76944ea657a9db94f9a4bef38f88c46ed4166983 |
| SHA256 | 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34 |
| SHA512 | 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-21 14:27
Reported
2024-05-21 14:29
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
149s
Command Line
Signatures
Guloader,Cloudeye
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Bolvrkercalcei2 = "C:\\Users\\Admin\\Sandsynliggres\\rainmak.vbs" | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2864 set thread context of 616 | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe |
| PID 2428 set thread context of 3868 | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | C:\Users\Admin\Sandsynliggres\rainmak.exe |
Enumerates physical storage devices
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe | N/A |
| N/A | N/A | C:\Users\Admin\Sandsynliggres\rainmak.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe
"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"
C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe
"C:\Users\Admin\AppData\Local\Temp\New PO as per attached-2020-6642.exe"
C:\Users\Admin\Sandsynliggres\rainmak.exe
"C:\Users\Admin\Sandsynliggres\rainmak.exe"
C:\Users\Admin\Sandsynliggres\rainmak.exe
"C:\Users\Admin\Sandsynliggres\rainmak.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 91.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 13.107.137.11:443 | onedrive.live.com | tcp |
| NL | 23.62.61.137:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.137.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.61.62.23.in-addr.arpa | udp |
| NL | 23.62.61.137:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 65.142.123.92.in-addr.arpa | udp |
| US | 52.111.229.43:443 | tcp | |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
memory/2864-2-0x0000000002A00000-0x0000000002A07000-memory.dmp
memory/2864-3-0x0000000077661000-0x0000000077781000-memory.dmp
memory/616-4-0x0000000000400000-0x00000000004E7000-memory.dmp
memory/2864-6-0x0000000002A00000-0x0000000002A07000-memory.dmp
memory/616-9-0x0000000077661000-0x0000000077781000-memory.dmp
memory/616-8-0x00000000004F0000-0x00000000005F0000-memory.dmp
C:\Users\Admin\Sandsynliggres\rainmak.exe
| MD5 | b17644b26f54aee17d39cb7bfceee846 |
| SHA1 | a6b0b1155257bbaf9d710fd8d9b92b94601d82d9 |
| SHA256 | 6f840786f7756f4b7bd84cfc327477af8a3aa99ba9768581f52a7ba3df9af806 |
| SHA512 | bad64051fe0604f25630515ffa703304c153752664b846f1f90e8dc0d3bd3c426ccef8b169f013ba3d49dbaf4715be39ae3a0e8ff08ea6177427b22f459eeb93 |
memory/616-21-0x00000000004F0000-0x00000000005F0000-memory.dmp
memory/2428-24-0x00000000028C0000-0x00000000028C7000-memory.dmp
memory/2428-25-0x0000000077661000-0x0000000077781000-memory.dmp
memory/2428-29-0x00000000028C0000-0x00000000028C7000-memory.dmp
memory/3868-30-0x00000000004F0000-0x00000000005F0000-memory.dmp