Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe
-
Size
337KB
-
MD5
24b3f3ce1ad3547d531330d65d27292e
-
SHA1
631342516182094bcfe3c57b0cc254f042b6b2d3
-
SHA256
3d6115e8c6be1cfcd600eebaa0b16c5943896fb0f45e66cee3ec71c38c53439d
-
SHA512
05add7126941b56f7392ef731a169c9ecfa0c277db404858c1fe1e9249d9c425694217c9f6456f6b2ca1b6034bafd307dc4e783037aa5a518bbd4fc11e8aa9c5
-
SSDEEP
6144:7eJnFeYbW1ZTsLs0ZCihb12VkKOStr9jC0ZZm51/0jsqC59fofSlg:7SF/bqZmZckktRjZG51su9oqlg
Malware Config
Extracted
gcleaner
gcl-page.biz
194.145.227.161
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1304-2-0x0000000000220000-0x0000000000268000-memory.dmp family_onlylogger behavioral1/memory/1304-3-0x0000000000400000-0x000000000044B000-memory.dmp family_onlylogger behavioral1/memory/1304-6-0x0000000000400000-0x000000000044B000-memory.dmp family_onlylogger behavioral1/memory/1304-4-0x0000000000400000-0x0000000000884000-memory.dmp family_onlylogger behavioral1/memory/1304-5-0x0000000000220000-0x0000000000268000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2524 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.execmd.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2396 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 2396 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.execmd.exedescription pid process target process PID 1304 wrote to memory of 2524 1304 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe cmd.exe PID 1304 wrote to memory of 2524 1304 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe cmd.exe PID 1304 wrote to memory of 2524 1304 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe cmd.exe PID 1304 wrote to memory of 2524 1304 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe cmd.exe PID 2524 wrote to memory of 2396 2524 cmd.exe taskkill.exe PID 2524 wrote to memory of 2396 2524 cmd.exe taskkill.exe PID 2524 wrote to memory of 2396 2524 cmd.exe taskkill.exe PID 2524 wrote to memory of 2396 2524 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-