Analysis

  • max time kernel
    137s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 05:18

General

  • Target

    JaffaCakes118_4fb831a65cce2392df4c5f792dad31e2.exe

  • Size

    1.6MB

  • MD5

    4fb831a65cce2392df4c5f792dad31e2

  • SHA1

    887b24b866d5ad917273a3e8391ba785a5ba90a5

  • SHA256

    2e4d9754a395aa51d9d35a6af209c4b041b8fa5c7fdad41bfc0df97d841091f6

  • SHA512

    c2a2952741d4c045fe5a641bf7ff8ccfefa54608fa73a875eab00c74cc03464c2808c548df0a6abfeb52eeb2956fac0eecd67f2a4ab62a2f8d13613e670f20c5

  • SSDEEP

    24576:5AOcZ1svEiDery6uC+7CzDZS7ske7Cx38CJfyESnSUA6WftHb5pO0i0buNTbeUKI:zJEiyhz1S7ZsHEcSUA6WN3O31eb6ThZB

Malware Config

Signatures

  • WSHRAT

    WSHRAT is a variant of Houdini worm and has vbs and js variants.

  • WSHRAT payload 1 IoCs
  • Wshrat family
  • Blocklisted process makes network request 14 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fb831a65cce2392df4c5f792dad31e2.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fb831a65cce2392df4c5f792dad31e2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\74800197\WHS2.0.exe
      "C:\74800197\WHS2.0.exe" Community portal – Bulletin board,
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Roaming\EkoHX.vbs
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:904
    • C:\74800197\wcnaumia.pif
      "C:\74800197\wcnaumia.pif" fhmoqoe.prw
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Roaming\OPAFu.vbs
          4⤵
          • Blocklisted process makes network request
          • Drops startup file
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\74800197\envmhh.cos

    Filesize

    1.0MB

    MD5

    80eee5b692798640be0b6d0ca2f8768c

    SHA1

    c39d4b5b048194ef1acdecc8b7cab27e63bc0402

    SHA256

    9b6c1dad4b42a308e4fade72da97589161c7cc37c5d926353f216e1903ec9780

    SHA512

    c587cc27b96fa66a1188947b85f9f27ea61e502e21456411536f48e533377e80301a4fe82eba451d82c1d12b9c5368336d166542d44f12b990a73d10382612d8

  • C:\74800197\vijppg.txt

    Filesize

    47KB

    MD5

    808bdb5b8f93f34c6d64bb48283776ec

    SHA1

    e3f096b0ea493885ba3e1058594c2d48d4ea89c9

    SHA256

    799a62dc96ba037ccec9ca7a417a4c5428454a3f52c7b4444f728d79b5f06fd7

    SHA512

    97582524e55fbb90185dd4e5c8eb6ea5e1a57aa5354278878786881593ef2bd85f3fba8ef6a94d89b8f9dc14c07ee85553e58fa00dd64adfe73d954f3a4af0ff

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\json[1].json

    Filesize

    291B

    MD5

    c085beeb6f771b90fed94c1d940f97f6

    SHA1

    44a994d9175d6abaa9a3b5718e242fa659aed66a

    SHA256

    ff5681f440a7a4b019a4a59f43ad414393321d1eb6dc3874cea0a84e73a83c51

    SHA512

    9d000581b287cd3d5464c33c260008090369a4f5f380b7cfa72eb0fc3221ce0e07df0387f6d3d6b38253c215250ac873dec0f52c501e3d6312f0a5437723a76a

  • C:\Users\Admin\AppData\Roaming\EkoHX.vbs

    Filesize

    180KB

    MD5

    952b1cbd78885f81760a77dc3b453fd3

    SHA1

    4af75b46620b063fc23652c3ecaa3b4081074572

    SHA256

    fe3f15e4a3d59457c16fb955e38be8df4bfe3a0978a2b09c85705f14bb6d751d

    SHA512

    1d6f2f6d91f88725b9515b2877348616dee3d96b862014f6c6b54f41b18835483cdf5b6294e99e0fdff17d80d79b27ac70638cab6376b15526b87b592313b837

  • \74800197\WHS2.0.exe

    Filesize

    527KB

    MD5

    40acb53d42e4b4d20a0111e6dd847606

    SHA1

    d010be1ba9ceea60098bebbfee425c0cda66b9a2

    SHA256

    213d841404449d68dd9f50c18f7259074c43df2fd5221f0bbd34d2e89b611b73

    SHA512

    a7834c27ab5e432a9243376fc7b058e819c56290580f96c28dcd61ca6356d4a7507f907373635cfec933c2fb916cbd07abb50ef39b7b1416c665c77b3930794d

  • \74800197\wcnaumia.pif

    Filesize

    758KB

    MD5

    1d7071dd5cda216508b235c0e2318b05

    SHA1

    0b972fbc1ea8a47204b2a187e608744a4e947bc2

    SHA256

    788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996

    SHA512

    65965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118

  • memory/1460-102-0x0000000000420000-0x0000000000A43000-memory.dmp

    Filesize

    6.1MB

  • memory/1460-100-0x0000000000420000-0x0000000000A43000-memory.dmp

    Filesize

    6.1MB

  • memory/1460-104-0x0000000000420000-0x0000000000A43000-memory.dmp

    Filesize

    6.1MB

  • memory/1460-103-0x0000000000420000-0x0000000000A43000-memory.dmp

    Filesize

    6.1MB

  • memory/1460-101-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1460-106-0x0000000000420000-0x00000000004AA000-memory.dmp

    Filesize

    552KB

  • memory/2604-90-0x0000000073250000-0x00000000737FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2604-87-0x0000000073250000-0x00000000737FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2604-86-0x0000000073250000-0x00000000737FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2604-74-0x0000000073251000-0x0000000073252000-memory.dmp

    Filesize

    4KB