Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 07:39
Static task
static1
Behavioral task
behavioral1
Sample
ab8781ed006eff23e2f4391e9d87d33c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab8781ed006eff23e2f4391e9d87d33c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ab8781ed006eff23e2f4391e9d87d33c_JaffaCakes118.exe
-
Size
356KB
-
MD5
ab8781ed006eff23e2f4391e9d87d33c
-
SHA1
d557dc317e733bcc896a08158c4bc978b524c689
-
SHA256
6543fb158c4d0ace63d292da67d86920914c57280adeb9726694cb7805f7466b
-
SHA512
73c8f4b37d076e2d8606375d3bbc821ccaab5b82ba68e8b2aad48881dcb893ce218334cdaa026acc426080599794240157a6e56ceaa2979276e8e983dfc61a69
-
SSDEEP
6144:KPQzXx/rNASsV56sMrFQPUuqwogELhSblM0zPJFw1NDDPBRe5EMj:9zXpqSsV5crFQP+nVl0Pa1FDPBRkJj
Malware Config
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3532-2-0x00000000001C0000-0x00000000001EF000-memory.dmp family_onlylogger behavioral2/memory/3532-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/3532-5-0x00000000001C0000-0x00000000001EF000-memory.dmp family_onlylogger behavioral2/memory/3532-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/3532-6-0x0000000000400000-0x000000000090F000-memory.dmp family_onlylogger -
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2836 3532 WerFault.exe 83 4476 3532 WerFault.exe 83 948 3532 WerFault.exe 83 1788 3532 WerFault.exe 83 2216 3532 WerFault.exe 83 1820 3532 WerFault.exe 83 4680 3532 WerFault.exe 83 2600 3532 WerFault.exe 83 1404 3532 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ab8781ed006eff23e2f4391e9d87d33c_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab8781ed006eff23e2f4391e9d87d33c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab8781ed006eff23e2f4391e9d87d33c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab8781ed006eff23e2f4391e9d87d33c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 6362⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 6722⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 6522⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 6562⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 8682⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 10162⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 10802⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 14122⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 10202⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3532 -ip 35321⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3532 -ip 35321⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3532 -ip 35321⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3532 -ip 35321⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3532 -ip 35321⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3532 -ip 35321⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3532 -ip 35321⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3532 -ip 35321⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3532 -ip 35321⤵PID:2976