Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
9d3512c1635a67cfc4dd87c7a12e361f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9d3512c1635a67cfc4dd87c7a12e361f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9d3512c1635a67cfc4dd87c7a12e361f_JaffaCakes118.exe
-
Size
284KB
-
MD5
9d3512c1635a67cfc4dd87c7a12e361f
-
SHA1
932277e69ee648aafdacadf9bdca4f1246f9ca46
-
SHA256
6c3a498158b5c884210afb416d669bf6cdec59363d36fbef4ef9dec891dba8de
-
SHA512
d996928a601a079a1d0dd1f4586b4ed87f6ba14af56f3d7cc06346bea4f62600dc13d17f8807d2b1c6e15a28ac84ef21c563075dd3de41bdee0b02d4b59e0f1d
-
SSDEEP
6144:ANH6qwy0iixyYE/92YR3zB80j7eWrpRx27/U:AYdXZxy6YR3zKSx27
Malware Config
Extracted
gcleaner
gcl-page.biz
194.145.227.161
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/4780-2-0x00000000001C0000-0x00000000001EF000-memory.dmp family_onlylogger behavioral2/memory/4780-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4780-5-0x00000000001C0000-0x00000000001EF000-memory.dmp family_onlylogger behavioral2/memory/4780-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4780-6-0x0000000000400000-0x0000000000876000-memory.dmp family_onlylogger -
Program crash 8 IoCs
pid pid_target Process procid_target 4324 4780 WerFault.exe 83 3348 4780 WerFault.exe 83 1508 4780 WerFault.exe 83 3160 4780 WerFault.exe 83 4832 4780 WerFault.exe 83 4388 4780 WerFault.exe 83 772 4780 WerFault.exe 83 4828 4780 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d3512c1635a67cfc4dd87c7a12e361f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d3512c1635a67cfc4dd87c7a12e361f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9d3512c1635a67cfc4dd87c7a12e361f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 6242⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 6282⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 7442⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 7642⤵
- Program crash
PID:3160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 9162⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 10722⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 11202⤵
- Program crash
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 10762⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4780 -ip 47801⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4780 -ip 47801⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4780 -ip 47801⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4780 -ip 47801⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4780 -ip 47801⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4780 -ip 47801⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4780 -ip 47801⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4780 -ip 47801⤵PID:4384