Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe
-
Size
425KB
-
MD5
ec884a36d0759ffcaa1f91e11b500d9e
-
SHA1
60da167fabcdf85b0c9ffccfbc87b82d0054d3d6
-
SHA256
9db74178d1441af7488bef5d9f4d0defb036d7db60a90a034f9119e0d9021c7c
-
SHA512
1326f2bc35abb2b2b24ab2b6a8e5de6e080798ac0cf8e522f3be2c842dfc486548c582166bba60ad7c941d0ec4a85c5a30a0433fe9c53e4f61ebe64acaf3df2e
-
SSDEEP
6144:XZrkNzk+HbYGLSIl9q1UeU5V5rZNCaURt+UiFkc5hvhpizTWF+/2GjiHhkJHTE1b:1kZV7FLSIl9yI5V5KaB5hazFXpTEB
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 4 IoCs
resource yara_rule behavioral2/memory/840-2-0x00000000009F0000-0x0000000000A3F000-memory.dmp family_onlylogger behavioral2/memory/840-3-0x0000000000400000-0x0000000000920000-memory.dmp family_onlylogger behavioral2/memory/840-5-0x0000000000400000-0x0000000000920000-memory.dmp family_onlylogger behavioral2/memory/840-6-0x00000000009F0000-0x0000000000A3F000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 1436 840 WerFault.exe 83 4480 840 WerFault.exe 83 3616 840 WerFault.exe 83 1452 840 WerFault.exe 83 4540 840 WerFault.exe 83 2912 840 WerFault.exe 83 2920 840 WerFault.exe 83 -
Kills process with taskkill 1 IoCs
pid Process 2752 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 840 wrote to memory of 2344 840 ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe 102 PID 840 wrote to memory of 2344 840 ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe 102 PID 840 wrote to memory of 2344 840 ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe 102 PID 2344 wrote to memory of 2752 2344 cmd.exe 105 PID 2344 wrote to memory of 2752 2344 cmd.exe 105 PID 2344 wrote to memory of 2752 2344 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 7322⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 7842⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 7922⤵
- Program crash
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 7402⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 7402⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 9682⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ec884a36d0759ffcaa1f91e11b500d9e_JaffaCakes118.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 10042⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 840 -ip 8401⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 840 -ip 8401⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 840 -ip 8401⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 840 -ip 8401⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 840 -ip 8401⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 840 -ip 8401⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 840 -ip 8401⤵PID:4528