Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
9cf5b9e7082aeb36e7961916eae05c28_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9cf5b9e7082aeb36e7961916eae05c28_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9cf5b9e7082aeb36e7961916eae05c28_JaffaCakes118.exe
-
Size
304KB
-
MD5
9cf5b9e7082aeb36e7961916eae05c28
-
SHA1
a0a45cf5003aef11954ac3e9dff297a9ef8a37b6
-
SHA256
a90bc226fcaf18a89bad9b0a1a57085ecd055b726b67e3a3964d7da03d244007
-
SHA512
b71d23e10f26965f835480ee794a7b5021fd385af1b553b08e0e911ef53008cfffe86ebdd5a0f953c04a7b76e7ebad50e866a2286627a254568e49a0bca17431
-
SSDEEP
6144:iY70C7Tu+VGQzSaUZdDnQputx/DFO6QUlxldvM8WI:30C7S+VGQzSddDnQ+dDBxvMt
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 6 IoCs
resource yara_rule behavioral2/memory/2424-2-0x0000000002200000-0x000000000222E000-memory.dmp family_onlylogger behavioral2/memory/2424-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/2424-5-0x0000000000400000-0x00000000004D0000-memory.dmp family_onlylogger behavioral2/memory/2424-6-0x0000000002200000-0x000000000222E000-memory.dmp family_onlylogger behavioral2/memory/2424-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/2424-9-0x0000000000400000-0x00000000004D0000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 1156 2424 WerFault.exe 81 1076 2424 WerFault.exe 81 3584 2424 WerFault.exe 81 3756 2424 WerFault.exe 81 2220 2424 WerFault.exe 81 2544 2424 WerFault.exe 81 4576 2424 WerFault.exe 81 4016 2424 WerFault.exe 81 3252 2424 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cf5b9e7082aeb36e7961916eae05c28_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cf5b9e7082aeb36e7961916eae05c28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9cf5b9e7082aeb36e7961916eae05c28_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 6202⤵
- Program crash
PID:1156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 6562⤵
- Program crash
PID:1076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 7482⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 7642⤵
- Program crash
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 8562⤵
- Program crash
PID:2220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 10882⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 11402⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 7562⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 10922⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2424 -ip 24241⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2424 -ip 24241⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2424 -ip 24241⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2424 -ip 24241⤵PID:512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2424 -ip 24241⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2424 -ip 24241⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2424 -ip 24241⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2424 -ip 24241⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2424 -ip 24241⤵PID:1156