Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe
-
Size
304KB
-
MD5
a7946c9b215e4d6a26dfddb131d04e69
-
SHA1
f1b056dc1900fc8200b93186677aa6e3c9c92e07
-
SHA256
697798d7b063108abe8c5ea01ed847e75fc1bb7fb3649b83298df4bcfa6ff916
-
SHA512
c11bca2b8931705476f6e4854a8897c3e2a1df129392630e28889ee091f1224cc987b3362e363ca43a8d8e9c1caf446bd86830224bccb07d8d8181f06e3cf665
-
SSDEEP
6144:65gGL/GRvMWvddCLPAnJRD3smuShCpr/5OCYAWsKV:efevPuPAnJRjZM/5ORH
Malware Config
Signatures
-
Gcleaner family
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 iplogger.org 4 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 freegeoip.app -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2700 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2752 3012 a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe 31 PID 3012 wrote to memory of 2752 3012 a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe 31 PID 3012 wrote to memory of 2752 3012 a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe 31 PID 3012 wrote to memory of 2752 3012 a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2700 2752 cmd.exe 33 PID 2752 wrote to memory of 2700 2752 cmd.exe 33 PID 2752 wrote to memory of 2700 2752 cmd.exe 33 PID 2752 wrote to memory of 2700 2752 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "a7946c9b215e4d6a26dfddb131d04e69_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-