Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
1e1dfd75b188edb3e434a7345419732f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e1dfd75b188edb3e434a7345419732f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
1e1dfd75b188edb3e434a7345419732f_JaffaCakes118.exe
-
Size
283KB
-
MD5
1e1dfd75b188edb3e434a7345419732f
-
SHA1
2f3cf82c812532fec99ce9a0938c54622c81aa58
-
SHA256
83611467088ec8eb70f5a1194ba7e5de4dc080a14653e4b44ef29b6af0947005
-
SHA512
aad4741a29280204035709caf5c9bd17565ae01d066f4c4dfe1959e773882831a8370b706eae73b3a336eaa7d265a630ff8b6c5b49299fa7b39c047d70d5e021
-
SSDEEP
3072:SV6A8Ct9eaIt5jDTaRO2MyZdckRcifRRJES6fzwjCRd5K1dFnArywoOLi6pW:puSaItBPaRiyfcklvEyq5AnRwoOL3
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 6 IoCs
resource yara_rule behavioral2/memory/4056-2-0x0000000002D10000-0x0000000002D3E000-memory.dmp family_onlylogger behavioral2/memory/4056-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4056-5-0x0000000000400000-0x0000000002C7D000-memory.dmp family_onlylogger behavioral2/memory/4056-6-0x0000000002D10000-0x0000000002D3E000-memory.dmp family_onlylogger behavioral2/memory/4056-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4056-9-0x0000000000400000-0x0000000002C7D000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 4324 4056 WerFault.exe 81 4272 4056 WerFault.exe 81 4816 4056 WerFault.exe 81 2472 4056 WerFault.exe 81 1108 4056 WerFault.exe 81 2000 4056 WerFault.exe 81 3500 4056 WerFault.exe 81 1528 4056 WerFault.exe 81 3340 4056 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e1dfd75b188edb3e434a7345419732f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e1dfd75b188edb3e434a7345419732f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1e1dfd75b188edb3e434a7345419732f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 6202⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 6562⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 7442⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 7842⤵
- Program crash
PID:2472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 8442⤵
- Program crash
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10882⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10882⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 8722⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 10922⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4056 -ip 40561⤵PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4056 -ip 40561⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4056 -ip 40561⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4056 -ip 40561⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4056 -ip 40561⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4056 -ip 40561⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4056 -ip 40561⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4056 -ip 40561⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4056 -ip 40561⤵PID:1916