Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
135e3b953016398bcd507f952cb8d8a8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
135e3b953016398bcd507f952cb8d8a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
135e3b953016398bcd507f952cb8d8a8_JaffaCakes118.exe
-
Size
382KB
-
MD5
135e3b953016398bcd507f952cb8d8a8
-
SHA1
7ccfae43db1dbae65a20503b11d5499903b728dc
-
SHA256
6acf924acc2978d82ac6b7adc976b07158cc09b7d64676175a9a1e61e6312c2c
-
SHA512
91d3bd47dcaabb3699fc5dca9eeabd8e530faabd30245a69a332186bbb1280341113c655916a2757ce49a6e35a4d25b5918503a58735c12debe2b1493614aaf9
-
SSDEEP
6144:z1iODljRPqur0A1W54NkZGiPlx8YhLj6VU7cEhCmLGdk+QttYtoF:EO5jRPqurp1WLZGqZjQEs4fqQ
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 6 IoCs
resource yara_rule behavioral2/memory/3276-2-0x0000000004E60000-0x0000000004E8E000-memory.dmp family_onlylogger behavioral2/memory/3276-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/3276-6-0x0000000004E60000-0x0000000004E8E000-memory.dmp family_onlylogger behavioral2/memory/3276-5-0x0000000000400000-0x000000000325B000-memory.dmp family_onlylogger behavioral2/memory/3276-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/3276-9-0x0000000000400000-0x000000000325B000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 4376 3276 WerFault.exe 80 3352 3276 WerFault.exe 80 1208 3276 WerFault.exe 80 1852 3276 WerFault.exe 80 2808 3276 WerFault.exe 80 3244 3276 WerFault.exe 80 2044 3276 WerFault.exe 80 2268 3276 WerFault.exe 80 2056 3276 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 135e3b953016398bcd507f952cb8d8a8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\135e3b953016398bcd507f952cb8d8a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\135e3b953016398bcd507f952cb8d8a8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 6202⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 6562⤵
- Program crash
PID:3352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 7482⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 7482⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 8162⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 10882⤵
- Program crash
PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 11402⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 7562⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 10922⤵
- Program crash
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3276 -ip 32761⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3276 -ip 32761⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3276 -ip 32761⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3276 -ip 32761⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3276 -ip 32761⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 3276 -ip 32761⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3276 -ip 32761⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3276 -ip 32761⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3276 -ip 32761⤵PID:5116