Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-03-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
5a66d163366de0461ea3a97b192f2f68_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a66d163366de0461ea3a97b192f2f68_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
5a66d163366de0461ea3a97b192f2f68_JaffaCakes118.exe
-
Size
388KB
-
MD5
5a66d163366de0461ea3a97b192f2f68
-
SHA1
65f3373423fd2620530f3e0551304ad2ea838063
-
SHA256
b18aad2f2f6dd798cb2e30e96d2825aa9c21c32611a699790319d94b70b92e21
-
SHA512
14a18194a73967f6a9e5720f756efe0247c0aebb0c7413600f8a1a71ea049d8aecfc255789b0b3520ac6cbeffd8e2e5a5b47be55c016bf5db907f8b1feb9d914
-
SSDEEP
6144:0V4oJNYQqbxInrBdHJVjVkM0TJZTNowW6DKxMX5B6WSOGt43GQ2AYH/:0SQNAyrx5VkPdts6GxMXuWxGQ2AY
Malware Config
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 4 IoCs
resource yara_rule behavioral1/memory/2924-3-0x0000000000400000-0x00000000016D4000-memory.dmp family_onlylogger behavioral1/memory/2924-2-0x0000000000220000-0x0000000000269000-memory.dmp family_onlylogger behavioral1/memory/2924-4-0x0000000000400000-0x00000000016D4000-memory.dmp family_onlylogger behavioral1/memory/2924-7-0x0000000000400000-0x00000000016D4000-memory.dmp family_onlylogger -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2924 5a66d163366de0461ea3a97b192f2f68_JaffaCakes118.exe