Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
c566c71c00095c6246783790cd1556b5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c566c71c00095c6246783790cd1556b5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c566c71c00095c6246783790cd1556b5_JaffaCakes118.exe
-
Size
385KB
-
MD5
c566c71c00095c6246783790cd1556b5
-
SHA1
767f2b25a2457bd29fd19eb7ad9d09cd9c488ea5
-
SHA256
27056b49e0fe09639113c638bacd8773445ce3365b11059a8f66a436ca57c10d
-
SHA512
2f2896416dd757d5202544f4d3dfa688e81ea5289fbbbd4625bce0d74f7ee4faf2ca34e9fa68f702876ad3531836c552e24b9ee94c9d67f646d7acb65f97e748
-
SSDEEP
6144:yh+APDQ126OvAVJyD1kGmeXC78Ly/zC7j+cyXEDsCN:RAPk126OYVJFGme2rzg+XazN
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/4568-2-0x0000000004FB0000-0x0000000004FDE000-memory.dmp family_onlylogger behavioral2/memory/4568-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral2/memory/4568-6-0x0000000004FB0000-0x0000000004FDE000-memory.dmp family_onlylogger behavioral2/memory/4568-5-0x0000000000400000-0x000000000325B000-memory.dmp family_onlylogger behavioral2/memory/4568-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger -
Program crash 9 IoCs
pid pid_target Process procid_target 64 4568 WerFault.exe 81 4676 4568 WerFault.exe 81 4460 4568 WerFault.exe 81 3924 4568 WerFault.exe 81 3940 4568 WerFault.exe 81 1700 4568 WerFault.exe 81 100 4568 WerFault.exe 81 1868 4568 WerFault.exe 81 2548 4568 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c566c71c00095c6246783790cd1556b5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c566c71c00095c6246783790cd1556b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c566c71c00095c6246783790cd1556b5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 6202⤵
- Program crash
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 6562⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 7442⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 7642⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 8482⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 10362⤵
- Program crash
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 10882⤵
- Program crash
PID:100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 14002⤵
- Program crash
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 5562⤵
- Program crash
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4568 -ip 45681⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4568 -ip 45681⤵PID:452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4568 -ip 45681⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4568 -ip 45681⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4568 -ip 45681⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4568 -ip 45681⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4568 -ip 45681⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4568 -ip 45681⤵PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4568 -ip 45681⤵PID:1724