Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
2c2b18b625f46b2c92b1df8c7a0634e5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c2b18b625f46b2c92b1df8c7a0634e5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c2b18b625f46b2c92b1df8c7a0634e5_JaffaCakes118.exe
-
Size
325KB
-
MD5
2c2b18b625f46b2c92b1df8c7a0634e5
-
SHA1
d1a9f577d7808a399e1226fd88984ef4e107ae50
-
SHA256
3fba70cac321a434f3eb509f38e80919a6e43c86e964737f91ad416bec297933
-
SHA512
ecc5815b3c3c3d2443f44c55010ccd52a344448188113943e632def78fe40c342a1dac2a897f795131904c04d773fa2e9513336906df645c82668a26b113e27b
-
SSDEEP
6144:w63+o2J9uflgvvBASV0F3jPZpW+3Ttu+/LKUZrNVfs8V:1+o2PuflYASKFztuIN2
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 6 IoCs
resource yara_rule behavioral2/memory/4784-2-0x00000000016D0000-0x00000000016FE000-memory.dmp family_onlylogger behavioral2/memory/4784-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4784-6-0x00000000016D0000-0x00000000016FE000-memory.dmp family_onlylogger behavioral2/memory/4784-5-0x0000000000400000-0x0000000001423000-memory.dmp family_onlylogger behavioral2/memory/4784-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4784-9-0x0000000000400000-0x0000000001423000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 2924 4784 WerFault.exe 82 4852 4784 WerFault.exe 82 5080 4784 WerFault.exe 82 1900 4784 WerFault.exe 82 2236 4784 WerFault.exe 82 3132 4784 WerFault.exe 82 3380 4784 WerFault.exe 82 1432 4784 WerFault.exe 82 2192 4784 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c2b18b625f46b2c92b1df8c7a0634e5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c2b18b625f46b2c92b1df8c7a0634e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c2b18b625f46b2c92b1df8c7a0634e5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 6202⤵
- Program crash
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 6562⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 7842⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 7842⤵
- Program crash
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 7682⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 10882⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 11402⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 6562⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 10922⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4784 -ip 47841⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4784 -ip 47841⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4784 -ip 47841⤵PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4784 -ip 47841⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4784 -ip 47841⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4784 -ip 47841⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4784 -ip 47841⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4784 -ip 47841⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4784 -ip 47841⤵PID:1804