Analysis

  • max time kernel
    10s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 04:20

General

  • Target

    2ab67006fad0b7b4e8fb6496e221a529_JaffaCakes118.exe

  • Size

    4.4MB

  • MD5

    2ab67006fad0b7b4e8fb6496e221a529

  • SHA1

    47f849e72bd7d203755775eebef19e1efa71ee19

  • SHA256

    5cb7dc8f48821f9e1f48c9d2d52f0f8e435c1286e5e0df3551f614deccdc47dc

  • SHA512

    a6ed4b8ae46d5bfdc802054c8ca428500473d29a736e1277c9654c6dfa2ae481a9e5fe0c505e0be0beddc86f880d0212483014968f41e5d93c15190877b16452

  • SSDEEP

    98304:HnGhGTPqSqfA0kWqa+5RmaH9ieepOs6435I58hsNcA5Pa:mBI02a+5gageepOs6435I58hS

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.fcektsy.top/

Extracted

Family

gcleaner

C2

ggc-partners.in

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • OnlyLogger payload 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 9 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ab67006fad0b7b4e8fb6496e221a529_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ab67006fad0b7b4e8fb6496e221a529_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe
      "C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"
      2⤵
      • Executes dropped EXE
      PID:2220
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
        3⤵
          PID:236
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2512
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          3⤵
            PID:2844
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
              4⤵
                PID:112
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                  5⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:1984
              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                4⤵
                  PID:2748
            • C:\Users\Admin\AppData\Local\Temp\1.exe
              "C:\Users\Admin\AppData\Local\Temp\1.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2080
            • C:\Users\Admin\AppData\Local\Temp\2.exe
              "C:\Users\Admin\AppData\Local\Temp\2.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c taskkill /f /im chrome.exe
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2216
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im chrome.exe
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1924
            • C:\Users\Admin\AppData\Local\Temp\3.exe
              "C:\Users\Admin\AppData\Local\Temp\3.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2776
            • C:\Users\Admin\AppData\Local\Temp\4.exe
              "C:\Users\Admin\AppData\Local\Temp\4.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2696
            • C:\Users\Admin\AppData\Local\Temp\5.exe
              "C:\Users\Admin\AppData\Local\Temp\5.exe"
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Users\Admin\AppData\Local\Temp\5.exe
                "C:\Users\Admin\AppData\Local\Temp\5.exe" -a
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1732
            • C:\Users\Admin\AppData\Local\Temp\6.exe
              "C:\Users\Admin\AppData\Local\Temp\6.exe"
              2⤵
              • Executes dropped EXE
              PID:2652
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 1028
              2⤵
              • Program crash
              PID:2064

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            546f530c9fa2593a200f9822dc20ee22

            SHA1

            912ccea6eabdf41cbcfe3d06cfcf5993d7f204d9

            SHA256

            837b6ba9200af27574c66962d5863ea1b73cc6b68bf7093ea40756e537547d2f

            SHA512

            5681635a76fae323040afc1e0fd7ccb3af3cfb70287271524930147e77aebe58e1c90ed196c55a143a24035b2a702cf762b6e63703445135d9d090157efc3d9e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            8e88d4cac263a125457ff17d0bb9aca8

            SHA1

            ed960e00ce2d2a6b3fa174f265b020d741512cfe

            SHA256

            ee3302e245ca2f0da554580336d82558942c8d41dd4062aba8e30c4a5d3f3309

            SHA512

            b69541579295fb6bd5e90e651ffcebe884c786a11f7ab5e1b48d641307fdefdc01c709ffac326d21befd426b3f50fe33b4908689b07a302a2e98aa8da6e38176

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            61caf7fe86b09b08effef667a68e2c8f

            SHA1

            e3d7d69e6fb392b4ca5d9414be333d6e1460273a

            SHA256

            6afcafcc588b5080934f84d02373031167b641b6f1ff3cb0c5897c974bd19ae2

            SHA512

            30d72a652efe4d5682100a6fbcb29ba26e75e876a2b5ca71726f2188129003238bed3de758d5d5093a491b9059114b0daf743b3d7577eb63efde717b998f8d15

          • C:\Users\Admin\AppData\Local\Temp\5.exe

            Filesize

            56KB

            MD5

            e511bb4cf31a2307b6f3445a869bcf31

            SHA1

            76f5c6e8df733ac13d205d426831ed7672a05349

            SHA256

            56002017746f61eee8d8e9b5ad2f3cbb119dc99300c5b6d32c1be184d3e25137

            SHA512

            9c81de34bf3b0eb75405c726d641ef6090054e9be8e0c0ab1bb2ed095e6477ce2fa8996868bf8a77a720b210a76b5f4e1b3b086d7f40449d79498681b367199c

          • C:\Users\Admin\AppData\Local\Temp\6.exe

            Filesize

            900KB

            MD5

            a3e75b6fda5826af709b5e488e7cd9e7

            SHA1

            2fce3251b18ff02a06083aa8a037def64a604a78

            SHA256

            8fa23d5fe37e7e0aed12a8917dfb43c186d26771a70c3afcc2f8a540df7b1b46

            SHA512

            6d1f37799f510a0e7fc6bf19a13425aa1225754d654dbc20c84a147161c03d63d5acf9cb7603c22c7533d5ab060ddc12c4c45d4e238f4368e8504514416efc41

          • C:\Users\Admin\AppData\Local\Temp\CabA016.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\TarA23B.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • \Users\Admin\AppData\Local\Temp\1.exe

            Filesize

            178KB

            MD5

            41991f83e362a3deb76ac8113f057012

            SHA1

            19f26c609bd9ea85e6f51284857c0be3601fb847

            SHA256

            e71969fd2ce59cd4dae96e6e844803629fae4fa749c48824cd560d2606e28899

            SHA512

            c94f529ab1164a08816d72ed4131488307eaa181b8be9290866c2dd899b49a404779e43909862e5d4774f85041b629d8642eeedb69ca594e812eb556714e463e

          • \Users\Admin\AppData\Local\Temp\2.exe

            Filesize

            1.4MB

            MD5

            fb5ee4c6d208ccf26bb93b4f868475b9

            SHA1

            9f1eff363fbe71c895c76502ecaa33fe8e078383

            SHA256

            614f6b18d9a64fba2adad94f376716845ae96ea6507952ea94027093184ae376

            SHA512

            8bcdde4614dee6be3c76d77cc598e654c6993d7e6ec1990ff8c8c6c0a91ee9d5c50f0be21c35570d746408be50d33ebef766318bfcd14e86e941662180c41f4e

          • \Users\Admin\AppData\Local\Temp\3.exe

            Filesize

            8KB

            MD5

            9323e70f1f2169ed31a1b3f130804833

            SHA1

            d9a5fea3bdd54d4509f6228fa32c7164e864df66

            SHA256

            6fe7d70e9a5c92dac044cf54d080b64ec4fcbc08ea405e84533f74ced0e0400e

            SHA512

            fe9a4868f32a447fc757fef9753c049d2fc2af7fa47eee398b12813ece7d8414f493cba8c0f05454030e4b434aa7d06886be8e079cda460b05d925f03dbc6807

          • \Users\Admin\AppData\Local\Temp\4.exe

            Filesize

            357KB

            MD5

            4cb45ecf88e52581f5f3c686bcd1a636

            SHA1

            4140f1d875473701b15aa37193783384db264ea7

            SHA256

            944816173e25c3a57db52f1f19ce79b0ccb323a2e4129f3e96bfc3c537034360

            SHA512

            3b10318e57c04ef89f8c578891dc5a67ae648bcc1cf39b00b70822bc29d8c050191184a03ae070c98e5c01554945a1766307299b3d9b3a1258e8ef82336b7676

          • \Users\Admin\AppData\Local\Temp\Chrome 5.exe

            Filesize

            43KB

            MD5

            93460c75de91c3601b4a47d2b99d8f94

            SHA1

            f2e959a3291ef579ae254953e62d098fe4557572

            SHA256

            0fdba84fe8ed2cf97023c544d3f0807dbb12840c8e7d445a3a4f55174d78b5b2

            SHA512

            4370ae1a1fc10c91593839c51d0fbae5c0838692f95e03cac315882b026e70817b238f7fe7d9897049856469b038acc8ccfd73aae1af5775bfef35bde2bf7856

          • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

            Filesize

            7KB

            MD5

            339347f8a4bc7137b6a6a485f6cd0688

            SHA1

            9b198dc642f9f32ea38884d47c1fe7d8868e3f39

            SHA256

            c6f8eec2d3204bad0712705405fdb09555bf2bc26f83f0cf1d7966b86a46f601

            SHA512

            04c73aa7cff15895daf42119873df920e2ee9500d1293f470ad590cbd9cccf09f6df206f1aa9fa09e744f404f5365174f570a7f33a9a642453531dcfbaeb26fd

          • memory/2080-55-0x00000000002D0000-0x00000000002D6000-memory.dmp

            Filesize

            24KB

          • memory/2080-57-0x0000000000300000-0x0000000000306000-memory.dmp

            Filesize

            24KB

          • memory/2080-56-0x00000000002E0000-0x0000000000302000-memory.dmp

            Filesize

            136KB

          • memory/2080-50-0x0000000000880000-0x00000000008B2000-memory.dmp

            Filesize

            200KB

          • memory/2220-86-0x00000000006D0000-0x00000000006DE000-memory.dmp

            Filesize

            56KB

          • memory/2220-51-0x000000013F850000-0x000000013F860000-memory.dmp

            Filesize

            64KB

          • memory/2252-82-0x00000000748CE000-0x00000000748CF000-memory.dmp

            Filesize

            4KB

          • memory/2252-0-0x00000000748CE000-0x00000000748CF000-memory.dmp

            Filesize

            4KB

          • memory/2252-1-0x0000000001250000-0x00000000016C0000-memory.dmp

            Filesize

            4.4MB

          • memory/2696-83-0x0000000000400000-0x0000000000910000-memory.dmp

            Filesize

            5.1MB

          • memory/2748-104-0x000000013FEC0000-0x000000013FEC6000-memory.dmp

            Filesize

            24KB

          • memory/2776-49-0x0000000000330000-0x0000000000338000-memory.dmp

            Filesize

            32KB

          • memory/2844-93-0x000000013FE60000-0x000000013FE70000-memory.dmp

            Filesize

            64KB