Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe
-
Size
284KB
-
MD5
a8f1f11683ad9aab8d0a83878a46c71c
-
SHA1
8205edf9bd85f684f3ab1a90f01be0ee70108a91
-
SHA256
5ee1c44b9a5174e48cda267cbf38ef67971a520f521ce02395e152ed95e7c8ca
-
SHA512
b06a0115b0cc35cf280d173bd52ec62dca1bbbdbb7b1e46f4ad5f758b4122e2a9d2cfb9fb84423f2358bada55d1459803107157be7b730588a396d87625774ab
-
SSDEEP
6144:gdWy9iYZH+dGECyxpDRLgh6mXNdavy5m:gAobZH+dSyx9uh6m9wvy5
Malware Config
Extracted
gcleaner
gcl-page.biz
194.145.227.161
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 7 IoCs
resource yara_rule behavioral1/memory/2084-2-0x0000000000220000-0x000000000024F000-memory.dmp family_onlylogger behavioral1/memory/2084-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral1/memory/2084-10-0x0000000000220000-0x000000000024F000-memory.dmp family_onlylogger behavioral1/memory/2084-12-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral1/memory/2084-11-0x0000000000400000-0x0000000000876000-memory.dmp family_onlylogger behavioral1/memory/2084-25-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral1/memory/2084-23-0x0000000000400000-0x0000000000876000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 iplogger.org 8 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2804 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 taskkill.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2592 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2592 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2592 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2592 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2816 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 34 PID 2084 wrote to memory of 2816 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 34 PID 2084 wrote to memory of 2816 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 34 PID 2084 wrote to memory of 2816 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 34 PID 2084 wrote to memory of 2808 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 36 PID 2084 wrote to memory of 2808 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 36 PID 2084 wrote to memory of 2808 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 36 PID 2084 wrote to memory of 2808 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 36 PID 2084 wrote to memory of 3052 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 38 PID 2084 wrote to memory of 3052 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 38 PID 2084 wrote to memory of 3052 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 38 PID 2084 wrote to memory of 3052 2084 a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe 38 PID 3052 wrote to memory of 2804 3052 cmd.exe 40 PID 3052 wrote to memory of 2804 3052 cmd.exe 40 PID 3052 wrote to memory of 2804 3052 cmd.exe 40 PID 3052 wrote to memory of 2804 3052 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{Cdiu-nRaPG-635t-AUIA2}\36606033736.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{Cdiu-nRaPG-635t-AUIA2}\33669509623.exe" /mix2⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{Cdiu-nRaPG-635t-AUIA2}\62376176366.exe" /mix2⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "a8f1f11683ad9aab8d0a83878a46c71c_JaffaCakes118.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277B
MD56445250d234e789c0c2afe69f119e326
SHA103074f75c0ff50783d8c2e32d96e39b746540f66
SHA2562e6cd9433e66a9ebde268bc6949d4660de441790bd39ffc9cb0f4caaeb44320f
SHA512ecd094a4d026378f85435f8a2dc16c92c033aff92ba126d8bbb22d6b279b842d417f4df0f63199ea248d0ec64b9679acb5a1f835560d8e3c5b84be492cc0e68e