Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
f62b83e691c6723990cadfd22d20cb68_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f62b83e691c6723990cadfd22d20cb68_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f62b83e691c6723990cadfd22d20cb68_JaffaCakes118.exe
-
Size
284KB
-
MD5
f62b83e691c6723990cadfd22d20cb68
-
SHA1
5bb867da154f957ae4f0f59cc7df348210438762
-
SHA256
322e2172b60d694797e91a98109d97e2b167953bb82f8f0b007b159351f8350e
-
SHA512
28bcf94a1b24954ee8af2516dd6e27f40a1810b613f4a6ff42e5c5c123ebf99825af12f12b89f0fc73edc6d0af75a283ae60e27d9a4c44001d17c3af9bfe2c38
-
SSDEEP
6144:tYvav4ebMYAZdqV4893oh/zTrRgxhzjTwa/RxJg:tEav0IV48FohrR0TY
Malware Config
Extracted
gcleaner
gc-prtnrs.top
gcc-prtnrs.top
Signatures
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 5 IoCs
resource yara_rule behavioral2/memory/524-2-0x0000000002F50000-0x0000000002F80000-memory.dmp family_onlylogger behavioral2/memory/524-3-0x0000000000400000-0x0000000000432000-memory.dmp family_onlylogger behavioral2/memory/524-6-0x0000000002F50000-0x0000000002F80000-memory.dmp family_onlylogger behavioral2/memory/524-5-0x0000000000400000-0x0000000002C7D000-memory.dmp family_onlylogger behavioral2/memory/524-18-0x0000000000400000-0x0000000002C7D000-memory.dmp family_onlylogger -
Program crash 8 IoCs
pid pid_target Process procid_target 3672 524 WerFault.exe 82 4276 524 WerFault.exe 82 3336 524 WerFault.exe 82 2524 524 WerFault.exe 82 2052 524 WerFault.exe 82 4396 524 WerFault.exe 82 3516 524 WerFault.exe 82 5056 524 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62b83e691c6723990cadfd22d20cb68_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f62b83e691c6723990cadfd22d20cb68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f62b83e691c6723990cadfd22d20cb68_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 4562⤵
- Program crash
PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6442⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 4722⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 7402⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 8402⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 10362⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 11042⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 17722⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 524 -ip 5241⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 524 -ip 5241⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 524 -ip 5241⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 524 -ip 5241⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 524 -ip 5241⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 524 -ip 5241⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 524 -ip 5241⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 524 -ip 5241⤵PID:4228