Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe
-
Size
337KB
-
MD5
24b3f3ce1ad3547d531330d65d27292e
-
SHA1
631342516182094bcfe3c57b0cc254f042b6b2d3
-
SHA256
3d6115e8c6be1cfcd600eebaa0b16c5943896fb0f45e66cee3ec71c38c53439d
-
SHA512
05add7126941b56f7392ef731a169c9ecfa0c277db404858c1fe1e9249d9c425694217c9f6456f6b2ca1b6034bafd307dc4e783037aa5a518bbd4fc11e8aa9c5
-
SSDEEP
6144:7eJnFeYbW1ZTsLs0ZCihb12VkKOStr9jC0ZZm51/0jsqC59fofSlg:7SF/bqZmZckktRjZG51su9oqlg
Malware Config
Extracted
gcleaner
gcl-page.biz
194.145.227.161
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3332-2-0x0000000000960000-0x00000000009A8000-memory.dmp family_onlylogger behavioral2/memory/3332-3-0x0000000000400000-0x000000000044B000-memory.dmp family_onlylogger behavioral2/memory/3332-4-0x0000000000400000-0x0000000000884000-memory.dmp family_onlylogger behavioral2/memory/3332-6-0x0000000000400000-0x000000000044B000-memory.dmp family_onlylogger behavioral2/memory/3332-5-0x0000000000960000-0x00000000009A8000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1192 3332 WerFault.exe 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe 4448 3332 WerFault.exe 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe 3492 3332 WerFault.exe 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe 992 3332 WerFault.exe 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe 3904 3332 WerFault.exe 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe 4900 3332 WerFault.exe 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe 1624 3332 WerFault.exe 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.execmd.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4572 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4572 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.execmd.exedescription pid process target process PID 3332 wrote to memory of 2248 3332 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe cmd.exe PID 3332 wrote to memory of 2248 3332 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe cmd.exe PID 3332 wrote to memory of 2248 3332 24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe cmd.exe PID 2248 wrote to memory of 4572 2248 cmd.exe taskkill.exe PID 2248 wrote to memory of 4572 2248 cmd.exe taskkill.exe PID 2248 wrote to memory of 4572 2248 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 6882⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7322⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 9202⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7642⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7642⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 9482⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "24b3f3ce1ad3547d531330d65d27292e_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 7442⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3332 -ip 33321⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3332 -ip 33321⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3332 -ip 33321⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3332 -ip 33321⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3332 -ip 33321⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3332 -ip 33321⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3332 -ip 33321⤵PID:3512