Analysis

  • max time kernel
    52s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2024 00:53

General

  • Target

    98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe

  • Size

    128KB

  • MD5

    98583f8dd020c99738c5cccd0fc7bbc5

  • SHA1

    8fd3c23bf8e2537c4d466873452d0c02b911ec63

  • SHA256

    5680e9b53c6caef9d67ca22db7adf5422f8d60248610db7d8b7fdbc0cfde34d2

  • SHA512

    0e81046574d9d15e5bbe59f849b7afbe04a55e61b49a8b456f32ec97af7575233ad97292afeed90359be9ebaeb225e19cf4289424552d42683f4567556b43646

  • SSDEEP

    1536:77L0M/W62DHSXlbsWsG6awZ0J7+xC8ZwvMx5TeEpxuTJWt:3YMQDHpWd6awcHeuTgt

Malware Config

Extracted

Family

guloader

C2

https://drive.google.com/uc?export=download&id=1iCwhRA7c_EWbH6n9IYfjB2XdDTlzRgWo

xor.base64

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Guloader payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\98583f8dd020c99738c5cccd0fc7bbc5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-2-0x0000000000350000-0x000000000035B000-memory.dmp

    Filesize

    44KB

  • memory/1684-3-0x0000000077B01000-0x0000000077C02000-memory.dmp

    Filesize

    1.0MB