Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
08b0c8a78a4e6c9d9bfc0f32bb9c5304_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
08b0c8a78a4e6c9d9bfc0f32bb9c5304_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08b0c8a78a4e6c9d9bfc0f32bb9c5304_JaffaCakes118.exe
-
Size
294KB
-
MD5
08b0c8a78a4e6c9d9bfc0f32bb9c5304
-
SHA1
ac48d930b7a4474d94aa32ec1866c34849f05335
-
SHA256
d9b6ded9a373ec4acf4b426c4ad5fd318b6a3f8077429e9fe5b27bd66d6b5be6
-
SHA512
19da1490419f754fc4afe63b7ad985e5fd9563d4b8dc1982d4a1d61feaa7534482ffcb8e73d9bee24095d1ea7248cfb36ea425653cea2a9cf0d1d87656ec53c2
-
SSDEEP
3072:rqVRhqlyewShRzCBjpWfB7v+6Hcng2EEBviYSyyEmCL5dWc7YWnLH5SnCNeoBNTz:cbfShRWBjiB7WbdEEBHPWPW75SCIwY8
Malware Config
Extracted
gcleaner
ggc-partners.in
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/932-2-0x0000000002E20000-0x0000000002E50000-memory.dmp family_onlylogger behavioral2/memory/932-3-0x0000000000400000-0x0000000000432000-memory.dmp family_onlylogger behavioral2/memory/932-5-0x0000000002E20000-0x0000000002E50000-memory.dmp family_onlylogger behavioral2/memory/932-6-0x0000000000400000-0x0000000002C80000-memory.dmp family_onlylogger behavioral2/memory/932-17-0x0000000000400000-0x0000000002C80000-memory.dmp family_onlylogger -
Program crash 8 IoCs
pid pid_target Process procid_target 3732 932 WerFault.exe 81 2652 932 WerFault.exe 81 3020 932 WerFault.exe 81 1844 932 WerFault.exe 81 2232 932 WerFault.exe 81 3068 932 WerFault.exe 81 4436 932 WerFault.exe 81 5068 932 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08b0c8a78a4e6c9d9bfc0f32bb9c5304_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08b0c8a78a4e6c9d9bfc0f32bb9c5304_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08b0c8a78a4e6c9d9bfc0f32bb9c5304_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6202⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6402⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 7442⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 7842⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 7642⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10722⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10922⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 20402⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 932 -ip 9321⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 932 -ip 9321⤵PID:1712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 932 -ip 9321⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 932 -ip 9321⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 932 -ip 9321⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 932 -ip 9321⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 932 -ip 9321⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 932 -ip 9321⤵PID:1440