Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
e7670118fd4bd720b70a799bc68860b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7670118fd4bd720b70a799bc68860b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e7670118fd4bd720b70a799bc68860b9_JaffaCakes118.exe
-
Size
281KB
-
MD5
e7670118fd4bd720b70a799bc68860b9
-
SHA1
5bc054649f120473e2e022ba0e628c20649724e8
-
SHA256
f211d8be8001df12bba948be8bdb8db9c938a518052a50d358d02a04396c2dd5
-
SHA512
9f2edecedf05e2d0dc83e1932910bca94bf1878643719aacfc1e04d96b6702a12400b0f9259db01c46e920963293907edab12e575476f06f459c965ce8292e1c
-
SSDEEP
6144:6dk2Sqt6RT2VN8ODCQKvZLBAyPEhUad4eGsU9eR:v2d6R6VN8ODqBLS+9ad4egeR
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral1/memory/2536-2-0x0000000000220000-0x000000000024E000-memory.dmp family_onlylogger behavioral1/memory/2536-3-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger behavioral1/memory/2536-5-0x0000000000400000-0x00000000004CA000-memory.dmp family_onlylogger behavioral1/memory/2536-6-0x0000000000220000-0x000000000024E000-memory.dmp family_onlylogger behavioral1/memory/2536-7-0x0000000000400000-0x0000000000431000-memory.dmp family_onlylogger -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7670118fd4bd720b70a799bc68860b9_JaffaCakes118.exe