Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe
-
Size
425KB
-
MD5
ec884a36d0759ffcaa1f91e11b500d9e
-
SHA1
60da167fabcdf85b0c9ffccfbc87b82d0054d3d6
-
SHA256
9db74178d1441af7488bef5d9f4d0defb036d7db60a90a034f9119e0d9021c7c
-
SHA512
1326f2bc35abb2b2b24ab2b6a8e5de6e080798ac0cf8e522f3be2c842dfc486548c582166bba60ad7c941d0ec4a85c5a30a0433fe9c53e4f61ebe64acaf3df2e
-
SSDEEP
6144:XZrkNzk+HbYGLSIl9q1UeU5V5rZNCaURt+UiFkc5hvhpizTWF+/2GjiHhkJHTE1b:1kZV7FLSIl9yI5V5KaB5hazFXpTEB
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 3 IoCs
resource yara_rule behavioral1/memory/2204-2-0x0000000000220000-0x000000000026F000-memory.dmp family_onlylogger behavioral1/memory/2204-3-0x0000000000400000-0x0000000000920000-memory.dmp family_onlylogger behavioral1/memory/2204-4-0x0000000000400000-0x0000000000920000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
pid Process 1816 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2356 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1816 2204 ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe 28 PID 2204 wrote to memory of 1816 2204 ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe 28 PID 2204 wrote to memory of 1816 2204 ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe 28 PID 2204 wrote to memory of 1816 2204 ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe 28 PID 1816 wrote to memory of 2356 1816 cmd.exe 30 PID 1816 wrote to memory of 2356 1816 cmd.exe 30 PID 1816 wrote to memory of 2356 1816 cmd.exe 30 PID 1816 wrote to memory of 2356 1816 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-